General
-
Target
0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b
-
Size
124KB
-
Sample
240715-n6kyjsydjg
-
MD5
17c8f655104bd89f543f20c23cbc9526
-
SHA1
4a624212cf0ec3283fd7f17adcae42278b30a8a7
-
SHA256
0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b
-
SHA512
d0a56fb674d2df427f386ead142990c76868eff39d945e0d4c297aba3f006f8836264863153dd160d5e353ae5cacd595b1627f98dd44cdd23234c1ee21520037
-
SSDEEP
3072:qRf8aREy0dFOXrITS9od4+QpkZkps9fBux/ARVO:M0DsrWVEpkyps9JO/ARV
Static task
static1
Behavioral task
behavioral1
Sample
0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b
-
Size
124KB
-
MD5
17c8f655104bd89f543f20c23cbc9526
-
SHA1
4a624212cf0ec3283fd7f17adcae42278b30a8a7
-
SHA256
0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b
-
SHA512
d0a56fb674d2df427f386ead142990c76868eff39d945e0d4c297aba3f006f8836264863153dd160d5e353ae5cacd595b1627f98dd44cdd23234c1ee21520037
-
SSDEEP
3072:qRf8aREy0dFOXrITS9od4+QpkZkps9fBux/ARVO:M0DsrWVEpkyps9JO/ARV
-
Detects Strela Stealer payload
-