General

  • Target

    c3c41ea9bf6b0dd5cb4797d2342beac0aa304885e6be13365c606154b63922ce.exe

  • Size

    525KB

  • Sample

    241101-f4l4tsynhj

  • MD5

    2f38fd8d1e6547ea194ede02d2d103f7

  • SHA1

    de54ddb85adc42246282f455cfa6bc95baea4846

  • SHA256

    c3c41ea9bf6b0dd5cb4797d2342beac0aa304885e6be13365c606154b63922ce

  • SHA512

    f02658cf6fb214599e83040321b59305394a7df0ecb9550f1fb1866c795fe6b7e2fac5216bba4f10ae68ee90fb731fb0fdc35c7471e1792839a576f7c1fec411

  • SSDEEP

    6144:bGzCC5wuU6diqel8aaXQDgZxHLo9GQrf/5veypkCyJn7DQkmchwLmsYrP0jp8czO:KaseKaaXQUbr+hVeyfyN/Z7Yms3rz

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.82

Attributes
  • url_path

    /server.php

Targets

    • Target

      c3c41ea9bf6b0dd5cb4797d2342beac0aa304885e6be13365c606154b63922ce.exe

    • Size

      525KB

    • MD5

      2f38fd8d1e6547ea194ede02d2d103f7

    • SHA1

      de54ddb85adc42246282f455cfa6bc95baea4846

    • SHA256

      c3c41ea9bf6b0dd5cb4797d2342beac0aa304885e6be13365c606154b63922ce

    • SHA512

      f02658cf6fb214599e83040321b59305394a7df0ecb9550f1fb1866c795fe6b7e2fac5216bba4f10ae68ee90fb731fb0fdc35c7471e1792839a576f7c1fec411

    • SSDEEP

      6144:bGzCC5wuU6diqel8aaXQDgZxHLo9GQrf/5veypkCyJn7DQkmchwLmsYrP0jp8czO:KaseKaaXQUbr+hVeyfyN/Z7Yms3rz

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela family

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks