General
-
Target
19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0
-
Size
125KB
-
Sample
240715-n8n3zszdja
-
MD5
31e9a2b1534a9fe2b68bea627ab9bf4b
-
SHA1
1e2110897d8c01830fafc5b0d5a1bc381deffe79
-
SHA256
19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0
-
SHA512
e469557232149b28a7259c13d80bac5452e8d2e29c6621dc895698c11a0d75e771a91af2910fdbe6cf8751f31f03e7c667b01f4ee6165d6433f4e36974265616
-
SSDEEP
3072:wH+zvAeClVnQa5EZbRLgGLsE8br2J/Cu+RHzvGaczuqlLFC:LrsVQ51RceYyEnczuaxC
Static task
static1
Behavioral task
behavioral1
Sample
19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0
-
Size
125KB
-
MD5
31e9a2b1534a9fe2b68bea627ab9bf4b
-
SHA1
1e2110897d8c01830fafc5b0d5a1bc381deffe79
-
SHA256
19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0
-
SHA512
e469557232149b28a7259c13d80bac5452e8d2e29c6621dc895698c11a0d75e771a91af2910fdbe6cf8751f31f03e7c667b01f4ee6165d6433f4e36974265616
-
SSDEEP
3072:wH+zvAeClVnQa5EZbRLgGLsE8br2J/Cu+RHzvGaczuqlLFC:LrsVQ51RceYyEnczuaxC
-
Detects Strela Stealer payload
-