General
-
Target
c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08
-
Size
123KB
-
Sample
240715-pa3dds1bqb
-
MD5
b6d3e7f0c31079b6146f05472c6d28ce
-
SHA1
f552d640fd39a2a2a0ba22840e814d9163f05983
-
SHA256
c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08
-
SHA512
b68ddf323dc842c0ad0239f62b2ba10ea2c5bc330c77396994100d827560e646de2482bc2acffe0d07fec1336c744b5ccd9f874e37617a02de18e5f1c56daf4c
-
SSDEEP
3072:IQ4YYUCrf3xsErRUTG74kPHjUNOA/O00u7oJsRC:jCrf3OEdUT4HjUwN/s
Static task
static1
Behavioral task
behavioral1
Sample
c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08
-
Size
123KB
-
MD5
b6d3e7f0c31079b6146f05472c6d28ce
-
SHA1
f552d640fd39a2a2a0ba22840e814d9163f05983
-
SHA256
c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08
-
SHA512
b68ddf323dc842c0ad0239f62b2ba10ea2c5bc330c77396994100d827560e646de2482bc2acffe0d07fec1336c744b5ccd9f874e37617a02de18e5f1c56daf4c
-
SSDEEP
3072:IQ4YYUCrf3xsErRUTG74kPHjUNOA/O00u7oJsRC:jCrf3OEdUT4HjUwN/s
-
Detects Strela Stealer payload
-