General
-
Target
d1488fb9783987a259f7492e27dc6de8fce5764e93a725b038e87bd87103f61e
-
Size
124KB
-
Sample
240715-n8kqkaxamm
-
MD5
f08a12a39cad4d923beb3a1cc861f8eb
-
SHA1
1ba9c19918af0f09b7cae94b5a23c74fcf5815ec
-
SHA256
d1488fb9783987a259f7492e27dc6de8fce5764e93a725b038e87bd87103f61e
-
SHA512
52c66dc60412a0c8153ccff82be667cdad71dced6f63466b4ef54a0906203b0da74256fe3a1defff2e7e332b16906d70aa2d87d9765469984123b912014fd0cf
-
SSDEEP
3072:6Fl4srVO8vIPi+NznREhuhDhjPtYzwtPjhk:6TvgPi+NzREh6DhbtYzw
Static task
static1
Behavioral task
behavioral1
Sample
d1488fb9783987a259f7492e27dc6de8fce5764e93a725b038e87bd87103f61e.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
d1488fb9783987a259f7492e27dc6de8fce5764e93a725b038e87bd87103f61e
-
Size
124KB
-
MD5
f08a12a39cad4d923beb3a1cc861f8eb
-
SHA1
1ba9c19918af0f09b7cae94b5a23c74fcf5815ec
-
SHA256
d1488fb9783987a259f7492e27dc6de8fce5764e93a725b038e87bd87103f61e
-
SHA512
52c66dc60412a0c8153ccff82be667cdad71dced6f63466b4ef54a0906203b0da74256fe3a1defff2e7e332b16906d70aa2d87d9765469984123b912014fd0cf
-
SSDEEP
3072:6Fl4srVO8vIPi+NznREhuhDhjPtYzwtPjhk:6TvgPi+NzREh6DhbtYzw
-
Detects Strela Stealer payload
-