General
-
Target
ca898d6d99eeba2f07e2b46e410aa280da2f9dbda1a353f16813ca20e2cc3868
-
Size
124KB
-
Sample
240715-n8kessxaml
-
MD5
df817a75a13f0c581b025c45296ac685
-
SHA1
a185798f1e88da671b9a1bf01b85eb14d8f34489
-
SHA256
ca898d6d99eeba2f07e2b46e410aa280da2f9dbda1a353f16813ca20e2cc3868
-
SHA512
5cbbbeb4512d41d839bb28644d5a3e4e14219cebb56286308d5648bbcce7f090d353c3e9387b3e83a0fdf57b14156ebc06debe394057d4d0f55831a1130a9c03
-
SSDEEP
3072:t/6mslHYf8KlfERcH7X/vtSiWDaI2x5iLMNU2aGHar51u7TQ:tGSbmmX/v1WGB0k/aD9
Static task
static1
Behavioral task
behavioral1
Sample
ca898d6d99eeba2f07e2b46e410aa280da2f9dbda1a353f16813ca20e2cc3868.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
ca898d6d99eeba2f07e2b46e410aa280da2f9dbda1a353f16813ca20e2cc3868
-
Size
124KB
-
MD5
df817a75a13f0c581b025c45296ac685
-
SHA1
a185798f1e88da671b9a1bf01b85eb14d8f34489
-
SHA256
ca898d6d99eeba2f07e2b46e410aa280da2f9dbda1a353f16813ca20e2cc3868
-
SHA512
5cbbbeb4512d41d839bb28644d5a3e4e14219cebb56286308d5648bbcce7f090d353c3e9387b3e83a0fdf57b14156ebc06debe394057d4d0f55831a1130a9c03
-
SSDEEP
3072:t/6mslHYf8KlfERcH7X/vtSiWDaI2x5iLMNU2aGHar51u7TQ:tGSbmmX/v1WGB0k/aD9
-
Detects Strela Stealer payload
-