General
-
Target
ffcc9f97528214170f03db75839da277f86f1028c083363f912eb1578b6aaa68
-
Size
123KB
-
Sample
240715-n6kb1swbkm
-
MD5
c309d63db5c9f26b39014e24873b8939
-
SHA1
f37252ee5387810eb67a4a51c66aa03d7d55b875
-
SHA256
ffcc9f97528214170f03db75839da277f86f1028c083363f912eb1578b6aaa68
-
SHA512
2c0e519083f055d9bcc2b1a93bd3d79c313520380095d83b78bf3cd11093920ebfc5170b6c0d5b65fd99ab87c930949fd0eb8e020734ee0cfd0e61fbd5e43278
-
SSDEEP
3072:dfryIR4EH1yMOz4ZsfIeC4ZQyNgnK9aGcixMlPRXNF7YYnw:Zr/R4EHYk66WgccbRX/71
Static task
static1
Behavioral task
behavioral1
Sample
ffcc9f97528214170f03db75839da277f86f1028c083363f912eb1578b6aaa68.dll
Resource
win10v2004-20240704-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
ffcc9f97528214170f03db75839da277f86f1028c083363f912eb1578b6aaa68
-
Size
123KB
-
MD5
c309d63db5c9f26b39014e24873b8939
-
SHA1
f37252ee5387810eb67a4a51c66aa03d7d55b875
-
SHA256
ffcc9f97528214170f03db75839da277f86f1028c083363f912eb1578b6aaa68
-
SHA512
2c0e519083f055d9bcc2b1a93bd3d79c313520380095d83b78bf3cd11093920ebfc5170b6c0d5b65fd99ab87c930949fd0eb8e020734ee0cfd0e61fbd5e43278
-
SSDEEP
3072:dfryIR4EH1yMOz4ZsfIeC4ZQyNgnK9aGcixMlPRXNF7YYnw:Zr/R4EHYk66WgccbRX/71
-
Detects Strela Stealer payload
-