General
-
Target
4e893ce57cd53cc344932b93b064acfc6dd730cd8df148be5d0b7bf1a50b4ca8
-
Size
125KB
-
Sample
240715-n6h4ysycph
-
MD5
c27db38eb4e160731a9dbd0cd6b424d1
-
SHA1
414aecc1a242c03c7c0d2b39ecf08fd07fc882cc
-
SHA256
4e893ce57cd53cc344932b93b064acfc6dd730cd8df148be5d0b7bf1a50b4ca8
-
SHA512
90ff7c93a02ca6c1003fe97d78531d8ed894171e41ea0028cf287e451bffd68aff9b5ed32abbb42f61ce89d3905e47f50a64a826ec19908f76564b8c7b16643f
-
SSDEEP
3072:KguyDa5huD6Y4ya1at/k64hXYq3zlVCe7Wo7eIHhUCDNA/jrU:ZI0OJyWGk6YX5BE18eMUW+rU
Static task
static1
Behavioral task
behavioral1
Sample
4e893ce57cd53cc344932b93b064acfc6dd730cd8df148be5d0b7bf1a50b4ca8.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
4e893ce57cd53cc344932b93b064acfc6dd730cd8df148be5d0b7bf1a50b4ca8
-
Size
125KB
-
MD5
c27db38eb4e160731a9dbd0cd6b424d1
-
SHA1
414aecc1a242c03c7c0d2b39ecf08fd07fc882cc
-
SHA256
4e893ce57cd53cc344932b93b064acfc6dd730cd8df148be5d0b7bf1a50b4ca8
-
SHA512
90ff7c93a02ca6c1003fe97d78531d8ed894171e41ea0028cf287e451bffd68aff9b5ed32abbb42f61ce89d3905e47f50a64a826ec19908f76564b8c7b16643f
-
SSDEEP
3072:KguyDa5huD6Y4ya1at/k64hXYq3zlVCe7Wo7eIHhUCDNA/jrU:ZI0OJyWGk6YX5BE18eMUW+rU
-
Detects Strela Stealer payload
-