General

  • Target

    19494605804.zip

  • Size

    998KB

  • Sample

    241024-qlyp1sxepg

  • MD5

    4a4c8bac0c9446b1d81dca50a214066e

  • SHA1

    9f070fb3ebe49d08103f1ab77db8f6ef948cc712

  • SHA256

    5eebdb385f043a280bfe25000ce07568494f492c4427de38e17b6067e5f9571f

  • SHA512

    a6a8bb9f140c3f8d56a58006c7ac12bfdb012c06260a70dd85709f6e57e78c450e6e0212cec86fac24adb8b837444a0394bea713fd6a39e7554723526c6c7f57

  • SSDEEP

    24576:qw7nX0DkoHoUmIX/tZvSAi3QvQLkrTFX5vDSEp:BYkoHUIVR9lrRxDSEp

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.48

Attributes
  • url_path

    /server.php

Targets

    • Target

      13531bd403e5f8f607bf16144c38ffd94004eafa8e6a098628b915de07ba432b

    • Size

      242KB

    • MD5

      66fdb80a8bd53ec840cb88ce824352be

    • SHA1

      177ff3982d487160350586d1332dab66dab650f1

    • SHA256

      13531bd403e5f8f607bf16144c38ffd94004eafa8e6a098628b915de07ba432b

    • SHA512

      77b716b0b13dcbb097e40bfcba752fa3d2e8782fa0a7b382323999a27ec7fee439c5f0e7b0f2514668f081e28886559fe9cb6c6ed0848eca445406c874e15535

    • SSDEEP

      6144:7IM4FaYG1Lx82YNKz81tY5q2dPbS7BOK:7IM4FaYG7dQadTSr

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • Target

      1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff

    • Size

      278KB

    • MD5

      f50df05ae6238189b43ce1b1101f67c6

    • SHA1

      eee86d826e9ee48ab5dd0c0965277d0868b9df89

    • SHA256

      1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff

    • SHA512

      817d64e87d12cf76497f5ee482707db24ac0fbe131598636992f7ec0efb240bd3c59079fc9366eae4e03f4e1ce39990b05945e54d580ae9ba1b0f79223d0681f

    • SSDEEP

      6144:DMgNhY/LbOxL5HmXQ3w8rr984zwpzNjC7uJ4/VhTU:DtNQIL5Hmg3b6Ewz6U

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • Target

      77836c0b18bbfef70fd04ba674ea045bf109851efe76ae9bcc55c2dcd08cc3c5

    • Size

      273KB

    • MD5

      7733dafc9969cfd5820c488c3af0ab61

    • SHA1

      187d7c003f70be4c959739a64e65435bc6982cd5

    • SHA256

      77836c0b18bbfef70fd04ba674ea045bf109851efe76ae9bcc55c2dcd08cc3c5

    • SHA512

      e57df61e2935a553032a0df3cd8458c0e147024c302a78ddc62946bf0a8d2bc44f033d47c347073f4cbec34dafc9a9d4c54acda50d2c6714b5d38b2a2815680e

    • SSDEEP

      6144:PXDyrklVINTDHaQbnKXQFMZlTk1eXGgMNv4x0:PDEwADHPbBUdk8GfZ

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • Target

      bd26724bdc8c5d9cb65d361231048725fbc31072d4c457c23531bc4333460011

    • Size

      268KB

    • MD5

      a29f629adfa18d381704eccbf00d93b5

    • SHA1

      43ac38f239626efced77511b01843a9265a80964

    • SHA256

      bd26724bdc8c5d9cb65d361231048725fbc31072d4c457c23531bc4333460011

    • SHA512

      735aff7e620aafd82247033720fd6e36660ed9030310854353182cc965cfd475d3a3666b1e534ed315227bac278e71cb3c00fec48a03d498bd4c9b8874573ba4

    • SSDEEP

      6144:1/sLdQvczupieYqMda7o7ZgdKLnbF0zUmdwW/VkM3:1/sLdcczQ6a72icbFAz9kM3

    Score
    1/10
    • Target

      dbd301f710d45acdd639cda5cd47a5453b9abb8a361ed250bfc47de70318fec6

    • Size

      252KB

    • MD5

      b5abd3a8d68ee38e4ea54c28e773780d

    • SHA1

      cbdfe5904ef25fb17cb9bc625e680c4a39c73fd0

    • SHA256

      dbd301f710d45acdd639cda5cd47a5453b9abb8a361ed250bfc47de70318fec6

    • SHA512

      f7e50c3874d9d804f8e2ec8c05663eb6a741c2f54b607904e99488738bf59d232ea2847b44dbafb109eca94e5fe756c85ebd2f28e34a12452565f63a68672c36

    • SSDEEP

      6144:/neLZdltBao31NL+Icl/n8jZoaTvx/jSYZTCWeqIn04Nl79:/eLZddRN60jSaTvxrDTSqIvb79

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks