General
-
Target
3fe9d7fd75883f7a46173a086c54f310N.exe
-
Size
276KB
-
Sample
240713-eajaeathpl
-
MD5
3fe9d7fd75883f7a46173a086c54f310
-
SHA1
26b0421d8f85e731c08402189f87b271089288da
-
SHA256
8ba4fecbee4246eed85e53740253f3c706c643e685898515aeef20e120259b05
-
SHA512
4067a8feb84ed9763c438febf71088c1b2254c252407ad596825d508a18a715f9d8baf46cf22e824499441c37864fe6714379e3068f6d0c2662559b3e126e9ee
-
SSDEEP
6144:F5xShoRwVusjkDnlEF7K50MhtsomcWWSbJ58o4hrk492OXYaW4iUB:RyBar1mNWS78b3LVB
Static task
static1
Behavioral task
behavioral1
Sample
3fe9d7fd75883f7a46173a086c54f310N.dll
Resource
win7-20240705-en
Malware Config
Extracted
strela
45.9.74.176
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Targets
-
-
Target
3fe9d7fd75883f7a46173a086c54f310N.exe
-
Size
276KB
-
MD5
3fe9d7fd75883f7a46173a086c54f310
-
SHA1
26b0421d8f85e731c08402189f87b271089288da
-
SHA256
8ba4fecbee4246eed85e53740253f3c706c643e685898515aeef20e120259b05
-
SHA512
4067a8feb84ed9763c438febf71088c1b2254c252407ad596825d508a18a715f9d8baf46cf22e824499441c37864fe6714379e3068f6d0c2662559b3e126e9ee
-
SSDEEP
6144:F5xShoRwVusjkDnlEF7K50MhtsomcWWSbJ58o4hrk492OXYaW4iUB:RyBar1mNWS78b3LVB
-
Detects Strela Stealer payload
-