General
-
Target
c0939571c0a1f3dd6b00851a9affeb70N.exe
-
Size
260KB
-
Sample
240715-l2j5ca1bmm
-
MD5
c0939571c0a1f3dd6b00851a9affeb70
-
SHA1
28ade9ff9ab37701dd48d3a4d7771d25668c3f5c
-
SHA256
24a36dc957a9b7280664931649541063d09834907d399d63a2b0ca42c4a301ed
-
SHA512
57d9bdaa73fcb85cc38e8c9d5dec4268e5393cf0ac6d0b15c6fd225510de7ed2825b1f7b5ace4e5d00c431419f9bbb639f4ec09b7763f64387cc977221e4bb4f
-
SSDEEP
6144:YkIOSuPT9KTR2OoHH/DcRez7ksB/apsssKttUB:YibTAR2nr40tCiB
Static task
static1
Behavioral task
behavioral1
Sample
c0939571c0a1f3dd6b00851a9affeb70N.dll
Resource
win7-20240705-en
Malware Config
Extracted
strela
45.9.74.176
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Targets
-
-
Target
c0939571c0a1f3dd6b00851a9affeb70N.exe
-
Size
260KB
-
MD5
c0939571c0a1f3dd6b00851a9affeb70
-
SHA1
28ade9ff9ab37701dd48d3a4d7771d25668c3f5c
-
SHA256
24a36dc957a9b7280664931649541063d09834907d399d63a2b0ca42c4a301ed
-
SHA512
57d9bdaa73fcb85cc38e8c9d5dec4268e5393cf0ac6d0b15c6fd225510de7ed2825b1f7b5ace4e5d00c431419f9bbb639f4ec09b7763f64387cc977221e4bb4f
-
SSDEEP
6144:YkIOSuPT9KTR2OoHH/DcRez7ksB/apsssKttUB:YibTAR2nr40tCiB
-
Detects Strela Stealer payload
-