General
-
Target
040ef66b62ac07242a5d19bebb0e72ed529c363bd2f3084ae05c1a8ae1b97a91
-
Size
126KB
-
Sample
240715-n6a4caybpd
-
MD5
a913287f6e5e647ce1d4e5bef040a448
-
SHA1
05c22d3aca032bddb35d534c7e944053e657cfa2
-
SHA256
040ef66b62ac07242a5d19bebb0e72ed529c363bd2f3084ae05c1a8ae1b97a91
-
SHA512
23dc0fc518809cc547e2a278e95b7c9602c524032d06de5a06ba0b63e3c23ef6ade6fc7b4329f43d08ccd762ab22bcc9d598469d016622b730fc494f657e7a97
-
SSDEEP
3072:Nh6403NCGvSq0xxIab2zOl8B2iuL03UrVMEKVR4krs:NF03lVoxRpOB2aUrVN
Static task
static1
Behavioral task
behavioral1
Sample
040ef66b62ac07242a5d19bebb0e72ed529c363bd2f3084ae05c1a8ae1b97a91.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
040ef66b62ac07242a5d19bebb0e72ed529c363bd2f3084ae05c1a8ae1b97a91
-
Size
126KB
-
MD5
a913287f6e5e647ce1d4e5bef040a448
-
SHA1
05c22d3aca032bddb35d534c7e944053e657cfa2
-
SHA256
040ef66b62ac07242a5d19bebb0e72ed529c363bd2f3084ae05c1a8ae1b97a91
-
SHA512
23dc0fc518809cc547e2a278e95b7c9602c524032d06de5a06ba0b63e3c23ef6ade6fc7b4329f43d08ccd762ab22bcc9d598469d016622b730fc494f657e7a97
-
SSDEEP
3072:Nh6403NCGvSq0xxIab2zOl8B2iuL03UrVMEKVR4krs:NF03lVoxRpOB2aUrVN
-
Detects Strela Stealer payload
-