General

  • Target

    2ef673433b44a7aba4e1726f0dcf91498113d984412b94852f3d68f3dc219af5

  • Size

    267KB

  • Sample

    241113-yk6m8sxngx

  • MD5

    2fa7f7da5c6219378d3c93363cdc70ef

  • SHA1

    c3c95c66e67ce4bdaafd8822b36c43ea8f54fec3

  • SHA256

    2ef673433b44a7aba4e1726f0dcf91498113d984412b94852f3d68f3dc219af5

  • SHA512

    ac7b93034604e6aa84540b2aac3bc087026144ae5600c3833dc16b28370f12bf2633ad32b35f4c1cd71316f6930e0ca648e684d9fb2a2d228b9150305f19ab9c

  • SSDEEP

    6144:ZrJh6OU0QEMm76J3+Jixpcz5vI6ehqqMJm4XHn/k+VwYSlE1w6zsm:ZrOOU0v0t+4xpcdvINoLk6wYSlE1w6Qm

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.48

Attributes
  • url_path

    /server.php

Targets

    • Target

      2ef673433b44a7aba4e1726f0dcf91498113d984412b94852f3d68f3dc219af5

    • Size

      267KB

    • MD5

      2fa7f7da5c6219378d3c93363cdc70ef

    • SHA1

      c3c95c66e67ce4bdaafd8822b36c43ea8f54fec3

    • SHA256

      2ef673433b44a7aba4e1726f0dcf91498113d984412b94852f3d68f3dc219af5

    • SHA512

      ac7b93034604e6aa84540b2aac3bc087026144ae5600c3833dc16b28370f12bf2633ad32b35f4c1cd71316f6930e0ca648e684d9fb2a2d228b9150305f19ab9c

    • SSDEEP

      6144:ZrJh6OU0QEMm76J3+Jixpcz5vI6ehqqMJm4XHn/k+VwYSlE1w6zsm:ZrOOU0v0t+4xpcdvINoLk6wYSlE1w6Qm

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela family

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks