General
-
Target
d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3
-
Size
125KB
-
Sample
240715-n7n2layhna
-
MD5
9ceeaf8ad7b6ce0fc0edca9576976ba6
-
SHA1
8dc2b54613fd4759f313ed7b1fdd508277372bf4
-
SHA256
d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3
-
SHA512
7004e35099942e2c0a59d6752d5d948872394914537095c729dfd7139e8cf49bfaac71faf6e5f24319b00789bc74c4dfc14c676557d11c801870d5c3972d41d7
-
SSDEEP
3072:e9Z2muLFb+aq10n2YBnJm7Lm9uYYXuQQqMvKe:e9sT5Kx16JkepYyqMv
Static task
static1
Behavioral task
behavioral1
Sample
d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3
-
Size
125KB
-
MD5
9ceeaf8ad7b6ce0fc0edca9576976ba6
-
SHA1
8dc2b54613fd4759f313ed7b1fdd508277372bf4
-
SHA256
d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3
-
SHA512
7004e35099942e2c0a59d6752d5d948872394914537095c729dfd7139e8cf49bfaac71faf6e5f24319b00789bc74c4dfc14c676557d11c801870d5c3972d41d7
-
SSDEEP
3072:e9Z2muLFb+aq10n2YBnJm7Lm9uYYXuQQqMvKe:e9sT5Kx16JkepYyqMv
-
Detects Strela Stealer payload
-