General
-
Target
1d7df035f92fa03aba83450e3a538880N.exe
-
Size
123KB
-
Sample
240715-2bt5masdlr
-
MD5
1d7df035f92fa03aba83450e3a538880
-
SHA1
0a91d1bba5b82d076733eec390184abaa05d73e2
-
SHA256
a9ead07c150074f8506216a2e65ffc4a3ef4f16d24aa4316d4ea1eedbc2e8f0b
-
SHA512
5ac75e11df4bc7e507acf0813fc633537fd583c8c95b7d8f9399c4b045967f93d1c1de44a8abef6448d37d691776e9d80458e9e3300e547a6e7321b31dfee404
-
SSDEEP
3072:5AaN+gXcoQ/5F4ZcFPqOcVWRCzQNVlSbin9Y:soQ/5dFS4NHb
Static task
static1
Behavioral task
behavioral1
Sample
1d7df035f92fa03aba83450e3a538880N.dll
Resource
win7-20240704-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
1d7df035f92fa03aba83450e3a538880N.exe
-
Size
123KB
-
MD5
1d7df035f92fa03aba83450e3a538880
-
SHA1
0a91d1bba5b82d076733eec390184abaa05d73e2
-
SHA256
a9ead07c150074f8506216a2e65ffc4a3ef4f16d24aa4316d4ea1eedbc2e8f0b
-
SHA512
5ac75e11df4bc7e507acf0813fc633537fd583c8c95b7d8f9399c4b045967f93d1c1de44a8abef6448d37d691776e9d80458e9e3300e547a6e7321b31dfee404
-
SSDEEP
3072:5AaN+gXcoQ/5F4ZcFPqOcVWRCzQNVlSbin9Y:soQ/5dFS4NHb
-
Detects Strela Stealer payload
-