General
-
Target
c780d16a85d9286ce74c3cc98716ddd54786accaa373daca13c4da6f4e97a51f
-
Size
125KB
-
Sample
240715-n8sfeaxbkr
-
MD5
6eb65b2b4609f03b56ab1e5860fb79f5
-
SHA1
894fe9455e6880efb5df460b004926be9c3f7fc5
-
SHA256
c780d16a85d9286ce74c3cc98716ddd54786accaa373daca13c4da6f4e97a51f
-
SHA512
ccca55e5d352beae0256f0a829a47e12a92ca35b1d36c1b6336f7802cb86a0bc407a6dc71720ea6d66d00b99c94c36515afa93240bb76739759e036841c6217a
-
SSDEEP
3072:aeduJ6whLEo71eprnflvXWThOAsQpq6B5dI72gkvNh:aquJhD71epBQOAsczdS2gkv/
Static task
static1
Behavioral task
behavioral1
Sample
c780d16a85d9286ce74c3cc98716ddd54786accaa373daca13c4da6f4e97a51f.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
c780d16a85d9286ce74c3cc98716ddd54786accaa373daca13c4da6f4e97a51f
-
Size
125KB
-
MD5
6eb65b2b4609f03b56ab1e5860fb79f5
-
SHA1
894fe9455e6880efb5df460b004926be9c3f7fc5
-
SHA256
c780d16a85d9286ce74c3cc98716ddd54786accaa373daca13c4da6f4e97a51f
-
SHA512
ccca55e5d352beae0256f0a829a47e12a92ca35b1d36c1b6336f7802cb86a0bc407a6dc71720ea6d66d00b99c94c36515afa93240bb76739759e036841c6217a
-
SSDEEP
3072:aeduJ6whLEo71eprnflvXWThOAsQpq6B5dI72gkvNh:aquJhD71epBQOAsczdS2gkv/
-
Detects Strela Stealer payload
-