General

  • Target

    65bcd99f78a0ef84ada6e7ae4b349a915d08e150e38d76c15ed657cff2d8948c

  • Size

    416KB

  • Sample

    241117-b6dg9axnes

  • MD5

    e32d64da480b63435d9b559e718354d2

  • SHA1

    aff97210b69e95313c6b28d4bd87346f97b6c637

  • SHA256

    65bcd99f78a0ef84ada6e7ae4b349a915d08e150e38d76c15ed657cff2d8948c

  • SHA512

    8e1d0ae4d1537ce18de577674255350dd4bb73f5b2dfb185c9b8b9695c0f081f7e5501da123622528daf13a73943dffc7031d9187a2e00759c13168e5c38e685

  • SSDEEP

    6144:0zAcM4oqgAcjMPkvfJs3CeTqehGtXLEqNhNuLsYWkqitvqP7UOsX2IX27pxAl6Fo:0AcM5pjFH+CelQtXLEeKLZMPsm7Al0p

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.82

Attributes
  • url_path

    /server.php

Targets

    • Target

      65bcd99f78a0ef84ada6e7ae4b349a915d08e150e38d76c15ed657cff2d8948c

    • Size

      416KB

    • MD5

      e32d64da480b63435d9b559e718354d2

    • SHA1

      aff97210b69e95313c6b28d4bd87346f97b6c637

    • SHA256

      65bcd99f78a0ef84ada6e7ae4b349a915d08e150e38d76c15ed657cff2d8948c

    • SHA512

      8e1d0ae4d1537ce18de577674255350dd4bb73f5b2dfb185c9b8b9695c0f081f7e5501da123622528daf13a73943dffc7031d9187a2e00759c13168e5c38e685

    • SSDEEP

      6144:0zAcM4oqgAcjMPkvfJs3CeTqehGtXLEqNhNuLsYWkqitvqP7UOsX2IX27pxAl6Fo:0AcM5pjFH+CelQtXLEeKLZMPsm7Al0p

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela family

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks