General
-
Target
5e6564e1529f0154d0917363729a9ebfdb37b32083f8cc1d331bdd424adce9ed
-
Size
125KB
-
Sample
240715-n6a4caybpe
-
MD5
3187e1d97b66fedf43a3e1259a17851b
-
SHA1
ba6769811842ab38959d0de64741f6783be7866d
-
SHA256
5e6564e1529f0154d0917363729a9ebfdb37b32083f8cc1d331bdd424adce9ed
-
SHA512
2bf6661b5a43e65eb6aadef27806f7b4faf7cbdcf363b3ac0c69cd3841533cf50d23e29030374f2793c379a522a5e8ac36f98c3c4741c5f773e7b6d5ce4b73c7
-
SSDEEP
3072:twRgvakA2L+bBf03EPtgwJl6o9Npy9ENY:twRgvaWUOmH8o94sY
Static task
static1
Behavioral task
behavioral1
Sample
5e6564e1529f0154d0917363729a9ebfdb37b32083f8cc1d331bdd424adce9ed.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
5e6564e1529f0154d0917363729a9ebfdb37b32083f8cc1d331bdd424adce9ed
-
Size
125KB
-
MD5
3187e1d97b66fedf43a3e1259a17851b
-
SHA1
ba6769811842ab38959d0de64741f6783be7866d
-
SHA256
5e6564e1529f0154d0917363729a9ebfdb37b32083f8cc1d331bdd424adce9ed
-
SHA512
2bf6661b5a43e65eb6aadef27806f7b4faf7cbdcf363b3ac0c69cd3841533cf50d23e29030374f2793c379a522a5e8ac36f98c3c4741c5f773e7b6d5ce4b73c7
-
SSDEEP
3072:twRgvakA2L+bBf03EPtgwJl6o9Npy9ENY:twRgvaWUOmH8o94sY
-
Detects Strela Stealer payload
-