General
-
Target
946d73bf5f66c84fdef08d01ea2a04cdb8eb37f2c5013bf1cfdf798c19b8d267
-
Size
123KB
-
Sample
240715-n6xmcayend
-
MD5
d62a23df7c0c3df27c914e4cbfce90a7
-
SHA1
f02d1439c3fa4f68e807a8d75d64d14be642a1b6
-
SHA256
946d73bf5f66c84fdef08d01ea2a04cdb8eb37f2c5013bf1cfdf798c19b8d267
-
SHA512
cf52ce3a760bd077d962b7ad408d2f50e2adbf3e1ea1e5186028bf1fe00d9688f09cd8236eb115f42d644667bcfe00381af08e7d71c8ca8895f6871fd432140d
-
SSDEEP
3072:RJ6RU9xIYg1q20JvUKtSmYCLt3gvCWI3PA6X4dUFgPQ:6RCIT1qvJvUcSJGbeyI
Static task
static1
Behavioral task
behavioral1
Sample
946d73bf5f66c84fdef08d01ea2a04cdb8eb37f2c5013bf1cfdf798c19b8d267.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
946d73bf5f66c84fdef08d01ea2a04cdb8eb37f2c5013bf1cfdf798c19b8d267
-
Size
123KB
-
MD5
d62a23df7c0c3df27c914e4cbfce90a7
-
SHA1
f02d1439c3fa4f68e807a8d75d64d14be642a1b6
-
SHA256
946d73bf5f66c84fdef08d01ea2a04cdb8eb37f2c5013bf1cfdf798c19b8d267
-
SHA512
cf52ce3a760bd077d962b7ad408d2f50e2adbf3e1ea1e5186028bf1fe00d9688f09cd8236eb115f42d644667bcfe00381af08e7d71c8ca8895f6871fd432140d
-
SSDEEP
3072:RJ6RU9xIYg1q20JvUKtSmYCLt3gvCWI3PA6X4dUFgPQ:6RCIT1qvJvUcSJGbeyI
-
Detects Strela Stealer payload
-