General

  • Target

    df76697e10abf612636b2730406d03e0N.exe

  • Size

    289KB

  • Sample

    240715-qab2wasekl

  • MD5

    df76697e10abf612636b2730406d03e0

  • SHA1

    12cac36756722bca6904db2e5c2b293ff58ccdba

  • SHA256

    314fe86c95500f5b6269c1deaab527cd61d00a352c13f564a8fb11d589dd8c36

  • SHA512

    479d69267e959d0e03696a53d5c29dd2cac125a1d546728775d5bbc9eba8bb1f7aab8be64d5cc391194a2ad9a871d1de71a6badc8e69715496c13224a72db70f

  • SSDEEP

    6144:TvVxWzHQ6yLRNAhoXIqkuUswsTPP/IUTBW4G/8XqsnUY/4e53gxUB:TvVxWjiLsmXIDuFwsrX6F8asV/l3B

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.176

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Targets

    • Target

      df76697e10abf612636b2730406d03e0N.exe

    • Size

      289KB

    • MD5

      df76697e10abf612636b2730406d03e0

    • SHA1

      12cac36756722bca6904db2e5c2b293ff58ccdba

    • SHA256

      314fe86c95500f5b6269c1deaab527cd61d00a352c13f564a8fb11d589dd8c36

    • SHA512

      479d69267e959d0e03696a53d5c29dd2cac125a1d546728775d5bbc9eba8bb1f7aab8be64d5cc391194a2ad9a871d1de71a6badc8e69715496c13224a72db70f

    • SSDEEP

      6144:TvVxWzHQ6yLRNAhoXIqkuUswsTPP/IUTBW4G/8XqsnUY/4e53gxUB:TvVxWjiLsmXIDuFwsrX6F8asV/l3B

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks