General
-
Target
5c4bbed734b57d3c515ea1c615e80f6e869de7e8d72ce1943b29799f3406fa3b
-
Size
136KB
-
MD5
af6b959cfd793df22e5d7eaf2f456e9a
-
SHA1
507794208eba6387d0cb3a98d0bb83dfa1d9bd6d
-
SHA256
5c4bbed734b57d3c515ea1c615e80f6e869de7e8d72ce1943b29799f3406fa3b
-
SHA512
f40f6c4fc7dc05e4ba12baa632c0b9087d019973ee060287bc14f3f360b1b2c6cdb71b0efdff331bb2975024a36dd59b46fd75131bfe56e2123663483347b14e
-
SSDEEP
3072:E57QrRdArDw3RRQ0DnnmvxCQkd9F9pqd:EmrRdArDw30Snnmv01pq
Score
10/10
Malware Config
Extracted
Family
strela
C2
45.9.74.13
Attributes
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule sample family_strela -
Strela family
Files
-
5c4bbed734b57d3c515ea1c615e80f6e869de7e8d72ce1943b29799f3406fa3b