General
-
Target
ffcafc13cf1f83295c57b5a0b168d19e506ab4141b6e2eb9b9fcc121e7ef6dc9
-
Size
124KB
-
Sample
240715-n565dsyaqd
-
MD5
ceb6a0f893604fb594787d0d73c6fd86
-
SHA1
0e06c0c77610b1f8237faf7338111ad2ab433bc3
-
SHA256
ffcafc13cf1f83295c57b5a0b168d19e506ab4141b6e2eb9b9fcc121e7ef6dc9
-
SHA512
c7a75b12828aaaebd117a02913626b9cdc25e8c711cd1681bd6446ffe3f05cbb05fb32a0bd3543b98e6872f2a04e4e1571653dc1e1f5dc9a9eb6319809035ea9
-
SSDEEP
3072:49IiHF8NStJ3EeGsOFQeN0wiCCwZB1CSzANVC+mqDcZ+oEc:4Guqe0XXBbAXC+mqK
Static task
static1
Behavioral task
behavioral1
Sample
ffcafc13cf1f83295c57b5a0b168d19e506ab4141b6e2eb9b9fcc121e7ef6dc9.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
ffcafc13cf1f83295c57b5a0b168d19e506ab4141b6e2eb9b9fcc121e7ef6dc9
-
Size
124KB
-
MD5
ceb6a0f893604fb594787d0d73c6fd86
-
SHA1
0e06c0c77610b1f8237faf7338111ad2ab433bc3
-
SHA256
ffcafc13cf1f83295c57b5a0b168d19e506ab4141b6e2eb9b9fcc121e7ef6dc9
-
SHA512
c7a75b12828aaaebd117a02913626b9cdc25e8c711cd1681bd6446ffe3f05cbb05fb32a0bd3543b98e6872f2a04e4e1571653dc1e1f5dc9a9eb6319809035ea9
-
SSDEEP
3072:49IiHF8NStJ3EeGsOFQeN0wiCCwZB1CSzANVC+mqDcZ+oEc:4Guqe0XXBbAXC+mqK
-
Detects Strela Stealer payload
-