General
-
Target
4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55
-
Size
125KB
-
Sample
240715-n59khsvhql
-
MD5
2716fb510ab2b8c79f4431e16b0c4df5
-
SHA1
aece9b0d66c9c93fb7288c1fb9c43751dcf4e99d
-
SHA256
4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55
-
SHA512
f3980f92dcdd1c502bb18481305d1b3de1bf9c1aab83a0a3f33d87e202b354bd8e580d1d5c0452c5e08c375730abdfce95341688186fbe01808efc535ef13c10
-
SSDEEP
3072:xto/gN5wpgygOvZ5zfz5MYGU5nOVzO8YCCt7f62QdTE+:bo/gfYrb5MOxSl2D
Static task
static1
Behavioral task
behavioral1
Sample
4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55
-
Size
125KB
-
MD5
2716fb510ab2b8c79f4431e16b0c4df5
-
SHA1
aece9b0d66c9c93fb7288c1fb9c43751dcf4e99d
-
SHA256
4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55
-
SHA512
f3980f92dcdd1c502bb18481305d1b3de1bf9c1aab83a0a3f33d87e202b354bd8e580d1d5c0452c5e08c375730abdfce95341688186fbe01808efc535ef13c10
-
SSDEEP
3072:xto/gN5wpgygOvZ5zfz5MYGU5nOVzO8YCCt7f62QdTE+:bo/gfYrb5MOxSl2D
-
Detects Strela Stealer payload
-