General
-
Target
ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7
-
Size
126KB
-
Sample
240715-ntlz3svcjp
-
MD5
8a57cc13c96bde6d963947a9b00333c8
-
SHA1
c1dbe0a05855235412858b6bbfbb97d9ed488624
-
SHA256
ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7
-
SHA512
d748467b69171ea8799ae6f7a0431119073abc230cf59d5659adb8952af0fe818872ad34c66b15441e256a4df695620f13065c8428bfe5e43743761d435cb3c2
-
SSDEEP
3072:sdQmw+US80dmQIn5xBYB0v2MP133FfVxNWZU:saW+wmQaDPvZW
Static task
static1
Behavioral task
behavioral1
Sample
ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7
-
Size
126KB
-
MD5
8a57cc13c96bde6d963947a9b00333c8
-
SHA1
c1dbe0a05855235412858b6bbfbb97d9ed488624
-
SHA256
ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7
-
SHA512
d748467b69171ea8799ae6f7a0431119073abc230cf59d5659adb8952af0fe818872ad34c66b15441e256a4df695620f13065c8428bfe5e43743761d435cb3c2
-
SSDEEP
3072:sdQmw+US80dmQIn5xBYB0v2MP133FfVxNWZU:saW+wmQaDPvZW
-
Detects Strela Stealer payload
-