General
-
Target
40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015
-
Size
126KB
-
Sample
240715-n6bpwaybqe
-
MD5
82fa316fb7b8215937138a7d303e2fda
-
SHA1
d8680546a3313aeb661d38258b5a8f7053df0238
-
SHA256
40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015
-
SHA512
ca437bea39ece6180288e6c088a8ff12ba4f67f06dca363ce215e00e3987b3005ceb5c5faf08ef403264d241fe2fd846be3e9ba25ba6e1e32304fe5eb961b1ea
-
SSDEEP
3072:ELRGt0UdNeBYiuu3b/YAzWuv+eXpoieDUnHiPoYBsADgTxC4gl:QRKd0qi1rYhumop5hCRsT
Static task
static1
Behavioral task
behavioral1
Sample
40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015
-
Size
126KB
-
MD5
82fa316fb7b8215937138a7d303e2fda
-
SHA1
d8680546a3313aeb661d38258b5a8f7053df0238
-
SHA256
40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015
-
SHA512
ca437bea39ece6180288e6c088a8ff12ba4f67f06dca363ce215e00e3987b3005ceb5c5faf08ef403264d241fe2fd846be3e9ba25ba6e1e32304fe5eb961b1ea
-
SSDEEP
3072:ELRGt0UdNeBYiuu3b/YAzWuv+eXpoieDUnHiPoYBsADgTxC4gl:QRKd0qi1rYhumop5hCRsT
-
Detects Strela Stealer payload
-