General

  • Target

    188b04da5c1f1c95d728ae9a3b4dadf9a74c0d24084ddaea28c0526a66be5634N

  • Size

    465KB

  • Sample

    241106-d8lbzstkcv

  • MD5

    489f3dcdcdb4769ba1dee0ce77eac980

  • SHA1

    1de7c168ca13b97c2d11785c667a6f14139b573b

  • SHA256

    188b04da5c1f1c95d728ae9a3b4dadf9a74c0d24084ddaea28c0526a66be5634

  • SHA512

    0531f5cd71175728e56c772f096f9ce9c7ccd59318399d0b7f0918c9e0305b16a0debce090a6cf08a98347b753d3e389fa8a0438deee289497e4ab2e4230ec33

  • SSDEEP

    6144:4i9DmnPoicByNDOSysrULb//VMVrOpG7aJVGaqD+l4GI2PbYYIYfINEdVu2U+nd2:D9WNoFSJNO9+aI9Y+EDuEsAdSGRD

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.82

Attributes
  • url_path

    /server.php

Targets

    • Target

      188b04da5c1f1c95d728ae9a3b4dadf9a74c0d24084ddaea28c0526a66be5634N

    • Size

      465KB

    • MD5

      489f3dcdcdb4769ba1dee0ce77eac980

    • SHA1

      1de7c168ca13b97c2d11785c667a6f14139b573b

    • SHA256

      188b04da5c1f1c95d728ae9a3b4dadf9a74c0d24084ddaea28c0526a66be5634

    • SHA512

      0531f5cd71175728e56c772f096f9ce9c7ccd59318399d0b7f0918c9e0305b16a0debce090a6cf08a98347b753d3e389fa8a0438deee289497e4ab2e4230ec33

    • SSDEEP

      6144:4i9DmnPoicByNDOSysrULb//VMVrOpG7aJVGaqD+l4GI2PbYYIYfINEdVu2U+nd2:D9WNoFSJNO9+aI9Y+EDuEsAdSGRD

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela family

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks