General
-
Target
cbf0e5b9578f75c8dcacf2a65a37aa6a93f2a1c4e049f50a52a8156a7ec922f2
-
Size
123KB
-
Sample
240715-n59khsybma
-
MD5
04f5e7966dae9f1787d6d2b4adf44d5e
-
SHA1
a645250a6c3e7d39587fa9fbb73cb78891eb059d
-
SHA256
cbf0e5b9578f75c8dcacf2a65a37aa6a93f2a1c4e049f50a52a8156a7ec922f2
-
SHA512
8bccdf1799ba7b3d927bd015f929b5b4a236613327bfd0661f54221d7ccd53028128b74d86f66e58ddb8b65b7db523562907ae18998f001cceab210f14ace64a
-
SSDEEP
3072:ZwppS5WnQUfcVXYtiD4I+E/ceA2MSjDTB:Ig5KQ/K24ID/w2XDTB
Static task
static1
Behavioral task
behavioral1
Sample
cbf0e5b9578f75c8dcacf2a65a37aa6a93f2a1c4e049f50a52a8156a7ec922f2.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
cbf0e5b9578f75c8dcacf2a65a37aa6a93f2a1c4e049f50a52a8156a7ec922f2
-
Size
123KB
-
MD5
04f5e7966dae9f1787d6d2b4adf44d5e
-
SHA1
a645250a6c3e7d39587fa9fbb73cb78891eb059d
-
SHA256
cbf0e5b9578f75c8dcacf2a65a37aa6a93f2a1c4e049f50a52a8156a7ec922f2
-
SHA512
8bccdf1799ba7b3d927bd015f929b5b4a236613327bfd0661f54221d7ccd53028128b74d86f66e58ddb8b65b7db523562907ae18998f001cceab210f14ace64a
-
SSDEEP
3072:ZwppS5WnQUfcVXYtiD4I+E/ceA2MSjDTB:Ig5KQ/K24ID/w2XDTB
-
Detects Strela Stealer payload
-