General

  • Target

    466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4N

  • Size

    562KB

  • Sample

    241110-rxshtaydml

  • MD5

    9c9cfdcf546f5408e8f969cd47c28140

  • SHA1

    3d22f892b8eb0d6ce181f91c1d8a7bdc4a2c0622

  • SHA256

    466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4

  • SHA512

    cd7e4f0e0c4642769140e655e56ceaa81cc23483119de187079155324bdbfa007a0ce5fafed3188e0582b2a2f2e995533d1dea941e7c9ef5f76c457b1a0d495b

  • SSDEEP

    12288:VIdFIRWYIUJd2sjBFit4vulDNCr+ckscRCnOsIqHUqQ:fWYIqd2sjLu5R2++kszUq

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.86

Attributes
  • url_path

    /server.php

Targets

    • Target

      466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4N

    • Size

      562KB

    • MD5

      9c9cfdcf546f5408e8f969cd47c28140

    • SHA1

      3d22f892b8eb0d6ce181f91c1d8a7bdc4a2c0622

    • SHA256

      466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4

    • SHA512

      cd7e4f0e0c4642769140e655e56ceaa81cc23483119de187079155324bdbfa007a0ce5fafed3188e0582b2a2f2e995533d1dea941e7c9ef5f76c457b1a0d495b

    • SSDEEP

      12288:VIdFIRWYIUJd2sjBFit4vulDNCr+ckscRCnOsIqHUqQ:fWYIqd2sjLu5R2++kszUq

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela family

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks