General
-
Target
ecc4a0f3ece74b6478143636f13b2d3ac462f0c1824ce3ab5613ca1de84c9310
-
Size
124KB
-
Sample
240715-n8qa2szdkb
-
MD5
2745aea0a045b1a2e869f028ee01fa1e
-
SHA1
c45fb374c8080a5c53b775e5539d05761339dcff
-
SHA256
ecc4a0f3ece74b6478143636f13b2d3ac462f0c1824ce3ab5613ca1de84c9310
-
SHA512
f24bce76e6a801ba2272d0f162a5c6f44a818ea2d0642988b68003021380d966b4b108bf40d874d19e947350988f303c5c39f5083ac256e132bd6fafaa7f973e
-
SSDEEP
3072:QP4b8WOIEiWMHskUltyBRp//EZtpqHfvtb1:QY8WOIE3MPEyTp//Ercvtb
Static task
static1
Behavioral task
behavioral1
Sample
ecc4a0f3ece74b6478143636f13b2d3ac462f0c1824ce3ab5613ca1de84c9310.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
ecc4a0f3ece74b6478143636f13b2d3ac462f0c1824ce3ab5613ca1de84c9310
-
Size
124KB
-
MD5
2745aea0a045b1a2e869f028ee01fa1e
-
SHA1
c45fb374c8080a5c53b775e5539d05761339dcff
-
SHA256
ecc4a0f3ece74b6478143636f13b2d3ac462f0c1824ce3ab5613ca1de84c9310
-
SHA512
f24bce76e6a801ba2272d0f162a5c6f44a818ea2d0642988b68003021380d966b4b108bf40d874d19e947350988f303c5c39f5083ac256e132bd6fafaa7f973e
-
SSDEEP
3072:QP4b8WOIEiWMHskUltyBRp//EZtpqHfvtb1:QY8WOIE3MPEyTp//Ercvtb
-
Detects Strela Stealer payload
-