General
-
Target
bb409a16ddb7f9d38ff65782dd5696a8fef0f58f95a840ec33fa7e8aa7ecf898
-
Size
125KB
-
Sample
240715-n8sfeazdlh
-
MD5
e0cf86dd0059ed73e63aadff833e4b61
-
SHA1
c3dfc8f1aee64916731824a4c1b67941ae9d30a6
-
SHA256
bb409a16ddb7f9d38ff65782dd5696a8fef0f58f95a840ec33fa7e8aa7ecf898
-
SHA512
a7a2ae92fbc1fb8a76f7eddf460e4eb6c2a752de8a5de8fc2c8234b6c1b724071d61bccd059e6396cfda727554a2e5cadff275b9d85d5005c7d8fea3d8483f20
-
SSDEEP
3072:ARKJSCRIY76ERVSlGW4e3HVCrMgl0vmGKjZiGMsFvX6h:ARoH7xir3IMglUmGKTMk
Static task
static1
Behavioral task
behavioral1
Sample
bb409a16ddb7f9d38ff65782dd5696a8fef0f58f95a840ec33fa7e8aa7ecf898.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
bb409a16ddb7f9d38ff65782dd5696a8fef0f58f95a840ec33fa7e8aa7ecf898
-
Size
125KB
-
MD5
e0cf86dd0059ed73e63aadff833e4b61
-
SHA1
c3dfc8f1aee64916731824a4c1b67941ae9d30a6
-
SHA256
bb409a16ddb7f9d38ff65782dd5696a8fef0f58f95a840ec33fa7e8aa7ecf898
-
SHA512
a7a2ae92fbc1fb8a76f7eddf460e4eb6c2a752de8a5de8fc2c8234b6c1b724071d61bccd059e6396cfda727554a2e5cadff275b9d85d5005c7d8fea3d8483f20
-
SSDEEP
3072:ARKJSCRIY76ERVSlGW4e3HVCrMgl0vmGKjZiGMsFvX6h:ARoH7xir3IMglUmGKTMk
-
Detects Strela Stealer payload
-