General
-
Target
da224fd82fde89d87e8f271e5c5e6286fb42f9b9a10dad8147ed8c9d9393f29d
-
Size
124KB
-
Sample
240715-n6g7nawaql
-
MD5
b43e643e1f1b9fe3b151b87f90c66054
-
SHA1
033e950145b14b3e7e28974b7f9db60f5b3162d1
-
SHA256
da224fd82fde89d87e8f271e5c5e6286fb42f9b9a10dad8147ed8c9d9393f29d
-
SHA512
89cd5b9b31dac0c48811fb005daba8d16411251d6a6c5e0b64150f6510d5aeec57ffaf4e74d550d46d643df81b6216505298f48167cfe951fa0f2bea87466b2b
-
SSDEEP
3072:hm6eOGOJ+egt3ujR3lXzBTdGZ70OUnQMeqmWPfB:si+z3uXzBhgVU+qDP
Static task
static1
Behavioral task
behavioral1
Sample
da224fd82fde89d87e8f271e5c5e6286fb42f9b9a10dad8147ed8c9d9393f29d.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
da224fd82fde89d87e8f271e5c5e6286fb42f9b9a10dad8147ed8c9d9393f29d
-
Size
124KB
-
MD5
b43e643e1f1b9fe3b151b87f90c66054
-
SHA1
033e950145b14b3e7e28974b7f9db60f5b3162d1
-
SHA256
da224fd82fde89d87e8f271e5c5e6286fb42f9b9a10dad8147ed8c9d9393f29d
-
SHA512
89cd5b9b31dac0c48811fb005daba8d16411251d6a6c5e0b64150f6510d5aeec57ffaf4e74d550d46d643df81b6216505298f48167cfe951fa0f2bea87466b2b
-
SSDEEP
3072:hm6eOGOJ+egt3ujR3lXzBTdGZ70OUnQMeqmWPfB:si+z3uXzBhgVU+qDP
-
Detects Strela Stealer payload
-