General
-
Target
202febe577cc3f38e4edb00367edfeb0N.exe
-
Size
280KB
-
Sample
240715-2kagkssgll
-
MD5
202febe577cc3f38e4edb00367edfeb0
-
SHA1
8cc4532db11ee5083ddb90354b2591aa4c283fbb
-
SHA256
9083539da0cb9d9501558da5b5b66a7c5a935264fb3717220fdbcf26adb0b6e3
-
SHA512
23d5d50d7e15ea822e8e1f0f03a65de7bb27b80dbdce71dc5d1dcecb9dd567ba67ca9b31a0a96337d51b423cde373882871c6c338bf6eb03ab11286e7d6a5b9a
-
SSDEEP
6144:2grnHIJUCzuEh5xyJYgelEbUFdeFThQHaqBb03UB:2g2juHJYgYndeU6qpB
Static task
static1
Behavioral task
behavioral1
Sample
202febe577cc3f38e4edb00367edfeb0N.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
45.9.74.176
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Targets
-
-
Target
202febe577cc3f38e4edb00367edfeb0N.exe
-
Size
280KB
-
MD5
202febe577cc3f38e4edb00367edfeb0
-
SHA1
8cc4532db11ee5083ddb90354b2591aa4c283fbb
-
SHA256
9083539da0cb9d9501558da5b5b66a7c5a935264fb3717220fdbcf26adb0b6e3
-
SHA512
23d5d50d7e15ea822e8e1f0f03a65de7bb27b80dbdce71dc5d1dcecb9dd567ba67ca9b31a0a96337d51b423cde373882871c6c338bf6eb03ab11286e7d6a5b9a
-
SSDEEP
6144:2grnHIJUCzuEh5xyJYgelEbUFdeFThQHaqBb03UB:2g2juHJYgYndeU6qpB
-
Detects Strela Stealer payload
-