General

  • Target

    0de858b9ecb5b4a1427f618f7b2d5240N.exe

  • Size

    124KB

  • Sample

    240715-zyt22ayhrm

  • MD5

    0de858b9ecb5b4a1427f618f7b2d5240

  • SHA1

    15e649f2c1d2b2f191388e6045ab34095af9fb33

  • SHA256

    4441d586e9cbf50db59c73fca4d7e917951704b549fe40440647b90b01e22611

  • SHA512

    240ecacf76abe4a0cb1b9d82e6e46836f1b5817fd71e1f3df0dceebf9d85963a4d887647685dc5bc0c07c89e8e0f3ebe9f7d3a9c626ab0f9971561732e1a66c9

  • SSDEEP

    3072:SRuNlpTTctwfBmf3B41rLaUFnl6yiIq75xDpwqp:9HNMwfcp4NZFnlpe7ntx

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      0de858b9ecb5b4a1427f618f7b2d5240N.exe

    • Size

      124KB

    • MD5

      0de858b9ecb5b4a1427f618f7b2d5240

    • SHA1

      15e649f2c1d2b2f191388e6045ab34095af9fb33

    • SHA256

      4441d586e9cbf50db59c73fca4d7e917951704b549fe40440647b90b01e22611

    • SHA512

      240ecacf76abe4a0cb1b9d82e6e46836f1b5817fd71e1f3df0dceebf9d85963a4d887647685dc5bc0c07c89e8e0f3ebe9f7d3a9c626ab0f9971561732e1a66c9

    • SSDEEP

      3072:SRuNlpTTctwfBmf3B41rLaUFnl6yiIq75xDpwqp:9HNMwfcp4NZFnlpe7ntx

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks