General
-
Target
67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9
-
Size
122KB
-
Sample
240715-n6fc3ayclb
-
MD5
eb7d9928313c7c3e705a4142fd9197c1
-
SHA1
35a63d632df0517b933cae02d73bcf9bdf07a146
-
SHA256
67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9
-
SHA512
b40727119f5e5feef6a20aa7e7239e35abf53b3c708a0212bc8c0bd139372f53faba3b72fc17f3aa6924b976bd172a3f9a100414fa2aeaa43dd83fdb20cdb807
-
SSDEEP
3072:W89l7iMgbuV5/Y+4FFO8eO0gWqGNYPCpt67SYBp:hx43+womGNW5Sqp
Static task
static1
Behavioral task
behavioral1
Sample
67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9
-
Size
122KB
-
MD5
eb7d9928313c7c3e705a4142fd9197c1
-
SHA1
35a63d632df0517b933cae02d73bcf9bdf07a146
-
SHA256
67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9
-
SHA512
b40727119f5e5feef6a20aa7e7239e35abf53b3c708a0212bc8c0bd139372f53faba3b72fc17f3aa6924b976bd172a3f9a100414fa2aeaa43dd83fdb20cdb807
-
SSDEEP
3072:W89l7iMgbuV5/Y+4FFO8eO0gWqGNYPCpt67SYBp:hx43+womGNW5Sqp
-
Detects Strela Stealer payload
-