General

  • Target

    1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff

  • Size

    278KB

  • Sample

    241130-vhym3atkfq

  • MD5

    f50df05ae6238189b43ce1b1101f67c6

  • SHA1

    eee86d826e9ee48ab5dd0c0965277d0868b9df89

  • SHA256

    1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff

  • SHA512

    817d64e87d12cf76497f5ee482707db24ac0fbe131598636992f7ec0efb240bd3c59079fc9366eae4e03f4e1ce39990b05945e54d580ae9ba1b0f79223d0681f

  • SSDEEP

    6144:DMgNhY/LbOxL5HmXQ3w8rr984zwpzNjC7uJ4/VhTU:DtNQIL5Hmg3b6Ewz6U

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.48

Attributes
  • url_path

    /server.php

Targets

    • Target

      1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff

    • Size

      278KB

    • MD5

      f50df05ae6238189b43ce1b1101f67c6

    • SHA1

      eee86d826e9ee48ab5dd0c0965277d0868b9df89

    • SHA256

      1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff

    • SHA512

      817d64e87d12cf76497f5ee482707db24ac0fbe131598636992f7ec0efb240bd3c59079fc9366eae4e03f4e1ce39990b05945e54d580ae9ba1b0f79223d0681f

    • SSDEEP

      6144:DMgNhY/LbOxL5HmXQ3w8rr984zwpzNjC7uJ4/VhTU:DtNQIL5Hmg3b6Ewz6U

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela family

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks