General
-
Target
1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135
-
Size
124KB
-
Sample
240715-n589rayblc
-
MD5
714dd033be398e9c7e6841cbc0f4063e
-
SHA1
8a0579fcd8fbb43127b18daac2353c6105c8c6db
-
SHA256
1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135
-
SHA512
db5451766c53b9be32561eb34e757fc3ac99cb71952e2caacce75b31d2fd2aa46d73bd7ddfd092d156ac509fe6f8942f9b90d2820fce7cb8a30da4df96c76aae
-
SSDEEP
3072:gDy4gTgT89thrxnBy4uF4qNx2LmkbJki6U1NW:3rTxfBy4uF4qqLmkb+Y1N
Static task
static1
Behavioral task
behavioral1
Sample
1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135
-
Size
124KB
-
MD5
714dd033be398e9c7e6841cbc0f4063e
-
SHA1
8a0579fcd8fbb43127b18daac2353c6105c8c6db
-
SHA256
1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135
-
SHA512
db5451766c53b9be32561eb34e757fc3ac99cb71952e2caacce75b31d2fd2aa46d73bd7ddfd092d156ac509fe6f8942f9b90d2820fce7cb8a30da4df96c76aae
-
SSDEEP
3072:gDy4gTgT89thrxnBy4uF4qNx2LmkbJki6U1NW:3rTxfBy4uF4qqLmkb+Y1N
-
Detects Strela Stealer payload
-