General

  • Target

    c4034d71eb57955b3200806b0253c890N.exe

  • Size

    123KB

  • Sample

    240716-qaccmstfkm

  • MD5

    c4034d71eb57955b3200806b0253c890

  • SHA1

    0284c0ea872d1c50ab6d67d141cd9c0c79eb201d

  • SHA256

    415b06f7d77abbb0c3883339838318097eef277e1d94aa0f243528e5b6c85f49

  • SHA512

    8b46415c6489a1e019c8d03697facfbe28859913d3507650ed3e9e0427edbe4de978817f1f5e80a1c1cb85fe87a19115a79a8176086b8f2d6c517f80d6bb8e88

  • SSDEEP

    3072:Na5ui+0bINj5UXmqVhbtOzi9vUFvEmVjLFRHA4YOuDx7yuq4f4:E9VINSmqx+i9cGmVlRvZ07yuq64

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      c4034d71eb57955b3200806b0253c890N.exe

    • Size

      123KB

    • MD5

      c4034d71eb57955b3200806b0253c890

    • SHA1

      0284c0ea872d1c50ab6d67d141cd9c0c79eb201d

    • SHA256

      415b06f7d77abbb0c3883339838318097eef277e1d94aa0f243528e5b6c85f49

    • SHA512

      8b46415c6489a1e019c8d03697facfbe28859913d3507650ed3e9e0427edbe4de978817f1f5e80a1c1cb85fe87a19115a79a8176086b8f2d6c517f80d6bb8e88

    • SSDEEP

      3072:Na5ui+0bINj5UXmqVhbtOzi9vUFvEmVjLFRHA4YOuDx7yuq4f4:E9VINSmqx+i9cGmVlRvZ07yuq64

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks