General

  • Target

    a9106716569fa0124812047f6533d5972f39e8049024e7f27be19f10442da540N

  • Size

    233KB

  • Sample

    241027-q9cgpayakc

  • MD5

    c5ec494e76a447167dd2574ce8da6950

  • SHA1

    1e3059f9a0cd52f3104ee3211860f60328ecf35a

  • SHA256

    a9106716569fa0124812047f6533d5972f39e8049024e7f27be19f10442da540

  • SHA512

    cabe134e93f621189cef3e6a528944fef1a32f86a4d09260a3d3b1ed750b293790285ddd81b6e04583bf85a2e7d47eea75f2e0eb823a29af308800c11b3ef55e

  • SSDEEP

    6144:Nji4mGSMeHDhe/uRhEF/uhxlq66VWhCF8hOXLGQEDf1rPJz:wRPNe/uHEYhxMHVWhCehSGQ4PJz

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.48

Attributes
  • url_path

    /server.php

Targets

    • Target

      a9106716569fa0124812047f6533d5972f39e8049024e7f27be19f10442da540N

    • Size

      233KB

    • MD5

      c5ec494e76a447167dd2574ce8da6950

    • SHA1

      1e3059f9a0cd52f3104ee3211860f60328ecf35a

    • SHA256

      a9106716569fa0124812047f6533d5972f39e8049024e7f27be19f10442da540

    • SHA512

      cabe134e93f621189cef3e6a528944fef1a32f86a4d09260a3d3b1ed750b293790285ddd81b6e04583bf85a2e7d47eea75f2e0eb823a29af308800c11b3ef55e

    • SSDEEP

      6144:Nji4mGSMeHDhe/uRhEF/uhxlq66VWhCF8hOXLGQEDf1rPJz:wRPNe/uHEYhxMHVWhCehSGQ4PJz

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela family

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks