General
-
Target
f13a78e0ac90126f2695829dc0d5bbb82cb3bf0e4df34193bbaf230f990def6f
-
Size
126KB
-
Sample
240715-n6hhesycnf
-
MD5
1066654cf4a62e8a4e716868b194b53d
-
SHA1
e5e81927f9cac2cba260389124978203369f2043
-
SHA256
f13a78e0ac90126f2695829dc0d5bbb82cb3bf0e4df34193bbaf230f990def6f
-
SHA512
0f7e93f5737d41166bce7a24fc2e80de5441bf2c57836475788cc83d866fdadf9a04c410baa77cc90f837a7e658ed602091e177d0b1482d45a799e799e388343
-
SSDEEP
3072:wm/Rio2647Dl8wFkOVy/2qMty59tkQQktTGcktPk:wA7mD3FDyuqsy59RO
Static task
static1
Behavioral task
behavioral1
Sample
f13a78e0ac90126f2695829dc0d5bbb82cb3bf0e4df34193bbaf230f990def6f.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
f13a78e0ac90126f2695829dc0d5bbb82cb3bf0e4df34193bbaf230f990def6f
-
Size
126KB
-
MD5
1066654cf4a62e8a4e716868b194b53d
-
SHA1
e5e81927f9cac2cba260389124978203369f2043
-
SHA256
f13a78e0ac90126f2695829dc0d5bbb82cb3bf0e4df34193bbaf230f990def6f
-
SHA512
0f7e93f5737d41166bce7a24fc2e80de5441bf2c57836475788cc83d866fdadf9a04c410baa77cc90f837a7e658ed602091e177d0b1482d45a799e799e388343
-
SSDEEP
3072:wm/Rio2647Dl8wFkOVy/2qMty59tkQQktTGcktPk:wA7mD3FDyuqsy59RO
-
Detects Strela Stealer payload
-