General
-
Target
2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245
-
Size
121KB
-
Sample
240715-pa1vkayajj
-
MD5
41e490c8826f271248dafd303b60caa9
-
SHA1
ed01afbd0140171d8e028cff920f2b6d117f4b1d
-
SHA256
2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245
-
SHA512
01ecc2c3ad8f59da13d3b76be5b5ab238e56259e57accf507af5ee3c9fea2062e0cd6c401a1f559f05bddf1c32504906f1263970d08a7a2c702ad2973b941b98
-
SSDEEP
1536:umu+AA+GYs0R/LuN23Wglz7bnaWPw5i04+g4bb2vRrX/wOAPGojRR5ocYXmZoiMb:umnOrte2Rz7baWL+3kr69ohjGM
Static task
static1
Behavioral task
behavioral1
Sample
2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245
-
Size
121KB
-
MD5
41e490c8826f271248dafd303b60caa9
-
SHA1
ed01afbd0140171d8e028cff920f2b6d117f4b1d
-
SHA256
2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245
-
SHA512
01ecc2c3ad8f59da13d3b76be5b5ab238e56259e57accf507af5ee3c9fea2062e0cd6c401a1f559f05bddf1c32504906f1263970d08a7a2c702ad2973b941b98
-
SSDEEP
1536:umu+AA+GYs0R/LuN23Wglz7bnaWPw5i04+g4bb2vRrX/wOAPGojRR5ocYXmZoiMb:umnOrte2Rz7baWL+3kr69ohjGM
-
Detects Strela Stealer payload
-