General
-
Target
3896a642e72af66e23e3b9f657cb603f453cadc06466572ec565e9d894c50cd0
-
Size
122KB
-
Sample
240715-paf56axglq
-
MD5
e7ea297a2e2bfffc9023ab50fec8bd72
-
SHA1
b8796a99ef7826e589390ccdb6c4cd0d2835b91a
-
SHA256
3896a642e72af66e23e3b9f657cb603f453cadc06466572ec565e9d894c50cd0
-
SHA512
cc556e40836e485883e830547d04749bb44ef2f0195d1acf8dbcc3edc9ee55f0c55b43bc81b4e51ff70c888e857e4cede62a6a27048e88b40fbec5b2b3f3d65b
-
SSDEEP
3072:DCs1suGi1lHV682s+AEFOQ3wN/gwzxpd+r1N0xnLh:DXsuvHV6y+/E/gGfEE
Static task
static1
Behavioral task
behavioral1
Sample
3896a642e72af66e23e3b9f657cb603f453cadc06466572ec565e9d894c50cd0.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
3896a642e72af66e23e3b9f657cb603f453cadc06466572ec565e9d894c50cd0
-
Size
122KB
-
MD5
e7ea297a2e2bfffc9023ab50fec8bd72
-
SHA1
b8796a99ef7826e589390ccdb6c4cd0d2835b91a
-
SHA256
3896a642e72af66e23e3b9f657cb603f453cadc06466572ec565e9d894c50cd0
-
SHA512
cc556e40836e485883e830547d04749bb44ef2f0195d1acf8dbcc3edc9ee55f0c55b43bc81b4e51ff70c888e857e4cede62a6a27048e88b40fbec5b2b3f3d65b
-
SSDEEP
3072:DCs1suGi1lHV682s+AEFOQ3wN/gwzxpd+r1N0xnLh:DXsuvHV6y+/E/gGfEE
-
Detects Strela Stealer payload
-