General
-
Target
1cc684b437ea7a1c2e9fb470af23c8fbc072f9adf5d8cce04691d6d3bdb36c7b
-
Size
124KB
-
Sample
240715-n8q8caxarr
-
MD5
3601c734acb4d50620f30a90233ec67b
-
SHA1
30a485d216dabefd3d03f088d5cfbcdb982f516c
-
SHA256
1cc684b437ea7a1c2e9fb470af23c8fbc072f9adf5d8cce04691d6d3bdb36c7b
-
SHA512
679d527ecb5c68f0c074fa8e08fbad00cbd8f7ac4824075816cbe50e69cdb8ac0cfc634fdfe7d95d3f9642dcbc9b56ef7cbb49ed2ebcdabadabb4b4a171d1199
-
SSDEEP
3072:AJtr0I4BczbEHZ/xYsufKI+cfkuxQy9Q7na:+oLBH/xYsufCcfksf9Q7a
Static task
static1
Behavioral task
behavioral1
Sample
1cc684b437ea7a1c2e9fb470af23c8fbc072f9adf5d8cce04691d6d3bdb36c7b.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
1cc684b437ea7a1c2e9fb470af23c8fbc072f9adf5d8cce04691d6d3bdb36c7b
-
Size
124KB
-
MD5
3601c734acb4d50620f30a90233ec67b
-
SHA1
30a485d216dabefd3d03f088d5cfbcdb982f516c
-
SHA256
1cc684b437ea7a1c2e9fb470af23c8fbc072f9adf5d8cce04691d6d3bdb36c7b
-
SHA512
679d527ecb5c68f0c074fa8e08fbad00cbd8f7ac4824075816cbe50e69cdb8ac0cfc634fdfe7d95d3f9642dcbc9b56ef7cbb49ed2ebcdabadabb4b4a171d1199
-
SSDEEP
3072:AJtr0I4BczbEHZ/xYsufKI+cfkuxQy9Q7na:+oLBH/xYsufCcfksf9Q7a
-
Detects Strela Stealer payload
-