General

  • Target

    b973c262613ab38b8018595bcba5f0b0N.exe

  • Size

    122KB

  • Sample

    240716-n6twfs1gkm

  • MD5

    b973c262613ab38b8018595bcba5f0b0

  • SHA1

    9cab0f2d4f1942b38579e6c83a41b892209cee42

  • SHA256

    4a8fff3a4b347ab7b39aec5e41056543c8e1655b8cd2b22be862e447db8cc613

  • SHA512

    62f9867f5165606b3844381833e7f932ee32b959b095c74f26dd7c551530c1fd552e6f7676d3f04182c1bf340e6cad0bb442d69a6c5ea38a015d68593c6cac57

  • SSDEEP

    3072:qy33jXA527LmuZd8v5i6BbNDERg2J8V6xigs0kynH9gxmxwtpYC:qykob8hi67cJL1x9ge

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      b973c262613ab38b8018595bcba5f0b0N.exe

    • Size

      122KB

    • MD5

      b973c262613ab38b8018595bcba5f0b0

    • SHA1

      9cab0f2d4f1942b38579e6c83a41b892209cee42

    • SHA256

      4a8fff3a4b347ab7b39aec5e41056543c8e1655b8cd2b22be862e447db8cc613

    • SHA512

      62f9867f5165606b3844381833e7f932ee32b959b095c74f26dd7c551530c1fd552e6f7676d3f04182c1bf340e6cad0bb442d69a6c5ea38a015d68593c6cac57

    • SSDEEP

      3072:qy33jXA527LmuZd8v5i6BbNDERg2J8V6xigs0kynH9gxmxwtpYC:qykob8hi67cJL1x9ge

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks