General
-
Target
cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b
-
Size
123KB
-
Sample
240715-n6j19aycra
-
MD5
66d19a2af19d0635f70b29ca081fdc6e
-
SHA1
6c35a5b158a3a9bfc1cf8436c8a948efe207ce47
-
SHA256
cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b
-
SHA512
1c5bc6d7d78e22ca6a82db46ca5bc4adf04a9cede337dd1bc0197ca82e470f56fa5a91d868745a814ebc4e9bd6c909bf3be61398872f5997a969501acad053f5
-
SSDEEP
3072:ldDo0RwheAa96tMr63YWuwuz4SdP6yP3i5jYXCi8F:00uEAa96gwuznd3cMSn
Static task
static1
Behavioral task
behavioral1
Sample
cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b
-
Size
123KB
-
MD5
66d19a2af19d0635f70b29ca081fdc6e
-
SHA1
6c35a5b158a3a9bfc1cf8436c8a948efe207ce47
-
SHA256
cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b
-
SHA512
1c5bc6d7d78e22ca6a82db46ca5bc4adf04a9cede337dd1bc0197ca82e470f56fa5a91d868745a814ebc4e9bd6c909bf3be61398872f5997a969501acad053f5
-
SSDEEP
3072:ldDo0RwheAa96tMr63YWuwuz4SdP6yP3i5jYXCi8F:00uEAa96gwuznd3cMSn
-
Detects Strela Stealer payload
-