General

  • Target

    788c3ab40bbfd1dc19ae8a6611f9f050N.exe

  • Size

    124KB

  • Sample

    240716-gcwpmaxdjn

  • MD5

    788c3ab40bbfd1dc19ae8a6611f9f050

  • SHA1

    dbb33d9c772e44ee92184bb47782ab966d202192

  • SHA256

    489a0d37ee2ab8cc7ade2e97c500631d9c6f9749add6ef2a149a741e9e948b19

  • SHA512

    606d6147fe8001689a32c64bbf4a8c15865a9d5836703a1c15026d6a15d9d376b7356661e4fc97b10fd30550c29c5f4b512c94d722fe12b4d3b12088ee4fc659

  • SSDEEP

    3072:pWHr5xvtvhXj62Ofpjo6iXjrvyTp0A1LDakJnCVErJZKB64NIHK:pCvpNvYjbCrvy7DzzF

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      788c3ab40bbfd1dc19ae8a6611f9f050N.exe

    • Size

      124KB

    • MD5

      788c3ab40bbfd1dc19ae8a6611f9f050

    • SHA1

      dbb33d9c772e44ee92184bb47782ab966d202192

    • SHA256

      489a0d37ee2ab8cc7ade2e97c500631d9c6f9749add6ef2a149a741e9e948b19

    • SHA512

      606d6147fe8001689a32c64bbf4a8c15865a9d5836703a1c15026d6a15d9d376b7356661e4fc97b10fd30550c29c5f4b512c94d722fe12b4d3b12088ee4fc659

    • SSDEEP

      3072:pWHr5xvtvhXj62Ofpjo6iXjrvyTp0A1LDakJnCVErJZKB64NIHK:pCvpNvYjbCrvy7DzzF

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.