General
-
Target
54c04c66615bb415a5b2d24eb60fa01c46d344e21daac6c719ab4a4c7e7a3403
-
Size
123KB
-
Sample
240715-n83alsxcjl
-
MD5
56e43752f1a9f1ff4c52f59fc1bb32ae
-
SHA1
8039cc448e8b00c9bb7d2c36c47a7233e4ccdd9a
-
SHA256
54c04c66615bb415a5b2d24eb60fa01c46d344e21daac6c719ab4a4c7e7a3403
-
SHA512
3defbc355b80ddac5137ca92f4f021b8b79d2038021c33054ed01adf15b36255bbd201be024e5ac07eadc09965ee913968204d929911bdacc30772e51487cda6
-
SSDEEP
3072:GJGrL6IwUC0FAQN72e75wwFW+yOMsOZOHLlZYIbabzP50O:GJBwC0FPV7OmhxMrOrlZYIe0O
Static task
static1
Behavioral task
behavioral1
Sample
54c04c66615bb415a5b2d24eb60fa01c46d344e21daac6c719ab4a4c7e7a3403.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
54c04c66615bb415a5b2d24eb60fa01c46d344e21daac6c719ab4a4c7e7a3403
-
Size
123KB
-
MD5
56e43752f1a9f1ff4c52f59fc1bb32ae
-
SHA1
8039cc448e8b00c9bb7d2c36c47a7233e4ccdd9a
-
SHA256
54c04c66615bb415a5b2d24eb60fa01c46d344e21daac6c719ab4a4c7e7a3403
-
SHA512
3defbc355b80ddac5137ca92f4f021b8b79d2038021c33054ed01adf15b36255bbd201be024e5ac07eadc09965ee913968204d929911bdacc30772e51487cda6
-
SSDEEP
3072:GJGrL6IwUC0FAQN72e75wwFW+yOMsOZOHLlZYIbabzP50O:GJBwC0FPV7OmhxMrOrlZYIe0O
-
Detects Strela Stealer payload
-