General

  • Target

    b002beb2ffec00710ca0e89c29690e022adf2332f139d83d3b9c6165fa6e8ae3

  • Size

    600KB

  • Sample

    241105-jryhwawrbw

  • MD5

    228e23af65d5bbba1c392bd688e3f857

  • SHA1

    e8e8ad04167abea0a8a0adb35606a2c61135b2b6

  • SHA256

    b002beb2ffec00710ca0e89c29690e022adf2332f139d83d3b9c6165fa6e8ae3

  • SHA512

    c43a70d21ed2bb86f83e57044fa5effa96ba2f84ab3e036455e696e291eb1c2150b66322cbdd3e2f2e01f339132e89770212b2cf0dc1bd4579a8fab536ac5b39

  • SSDEEP

    12288:8+v/aSUoOMbIh/w2+4YzPyRu5KmKpauEUCL1UH0/EFl+:bHagcw4kPQuEHlEjhK

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.86

Attributes
  • url_path

    /server.php

Targets

    • Target

      b002beb2ffec00710ca0e89c29690e022adf2332f139d83d3b9c6165fa6e8ae3

    • Size

      600KB

    • MD5

      228e23af65d5bbba1c392bd688e3f857

    • SHA1

      e8e8ad04167abea0a8a0adb35606a2c61135b2b6

    • SHA256

      b002beb2ffec00710ca0e89c29690e022adf2332f139d83d3b9c6165fa6e8ae3

    • SHA512

      c43a70d21ed2bb86f83e57044fa5effa96ba2f84ab3e036455e696e291eb1c2150b66322cbdd3e2f2e01f339132e89770212b2cf0dc1bd4579a8fab536ac5b39

    • SSDEEP

      12288:8+v/aSUoOMbIh/w2+4YzPyRu5KmKpauEUCL1UH0/EFl+:bHagcw4kPQuEHlEjhK

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela family

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks