General
-
Target
523b23099348f7d9fa6cc20fffb8e500N.exe
-
Size
211KB
-
Sample
240715-bdhaqs1arr
-
MD5
523b23099348f7d9fa6cc20fffb8e500
-
SHA1
38bbcee0a0dba04c69b1d524742445aee614ddff
-
SHA256
a83fc9a9c54415e4494bbdaa5a41b880c9170c07252331f6242f379e29b901a2
-
SHA512
5a9e997bc7c649554df57f37e6efff04d27e85b88bc0e23da244e9295ba324c13c4e838bc7d7d3095b0386048f240f48a7afd56753afdd100c5cc37ddced95af
-
SSDEEP
6144:wg6t1PDwKD0PRqDA2DpWkwj8GG/ebt2cUB:wHbD0PRYA2DOrPUB
Static task
static1
Behavioral task
behavioral1
Sample
523b23099348f7d9fa6cc20fffb8e500N.dll
Resource
win7-20240704-en
Malware Config
Extracted
strela
45.9.74.176
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Targets
-
-
Target
523b23099348f7d9fa6cc20fffb8e500N.exe
-
Size
211KB
-
MD5
523b23099348f7d9fa6cc20fffb8e500
-
SHA1
38bbcee0a0dba04c69b1d524742445aee614ddff
-
SHA256
a83fc9a9c54415e4494bbdaa5a41b880c9170c07252331f6242f379e29b901a2
-
SHA512
5a9e997bc7c649554df57f37e6efff04d27e85b88bc0e23da244e9295ba324c13c4e838bc7d7d3095b0386048f240f48a7afd56753afdd100c5cc37ddced95af
-
SSDEEP
6144:wg6t1PDwKD0PRqDA2DpWkwj8GG/ebt2cUB:wHbD0PRYA2DOrPUB
-
Detects Strela Stealer payload
-