General
-
Target
520d7fbf7412bc830e5c8bd993226be5e332dc1bdf414623cc7f5887588f010d
-
Size
211KB
-
Sample
240331-1k5r2sde35
-
MD5
6b70f57fc62db710dfaaa527a58f723a
-
SHA1
9627adba486339ef47c5a3a4acf85ee486c7acb2
-
SHA256
520d7fbf7412bc830e5c8bd993226be5e332dc1bdf414623cc7f5887588f010d
-
SHA512
ca916a3240fd3e2d98df9eed6f41fb69f8dd4fc1a539abdcaee4472cfb3577782d5ca0370e366df0954ae9f0d327e1b2ed3b8cf235514d0234dd9a4d0280b1c4
-
SSDEEP
3072:OaHO5UfOrQIsuWIh/oaKRySFgCqWJMmz+wUex7mvBRjH9uNi1owmKzNweXITUB:O5U2Enaoa2gSt+2YNuWzpKUB
Static task
static1
Behavioral task
behavioral1
Sample
520d7fbf7412bc830e5c8bd993226be5e332dc1bdf414623cc7f5887588f010d.dll
Resource
win7-20240221-en
Malware Config
Extracted
strela
45.9.74.12
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Targets
-
-
Target
520d7fbf7412bc830e5c8bd993226be5e332dc1bdf414623cc7f5887588f010d
-
Size
211KB
-
MD5
6b70f57fc62db710dfaaa527a58f723a
-
SHA1
9627adba486339ef47c5a3a4acf85ee486c7acb2
-
SHA256
520d7fbf7412bc830e5c8bd993226be5e332dc1bdf414623cc7f5887588f010d
-
SHA512
ca916a3240fd3e2d98df9eed6f41fb69f8dd4fc1a539abdcaee4472cfb3577782d5ca0370e366df0954ae9f0d327e1b2ed3b8cf235514d0234dd9a4d0280b1c4
-
SSDEEP
3072:OaHO5UfOrQIsuWIh/oaKRySFgCqWJMmz+wUex7mvBRjH9uNi1owmKzNweXITUB:O5U2Enaoa2gSt+2YNuWzpKUB
-
Detects Strela Stealer payload
-