General
-
Target
7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40
-
Size
124KB
-
Sample
240715-pawwlsxhpl
-
MD5
a1864815fc365c676580eb540e2de8b3
-
SHA1
e9422c6e7e28e21bbbea22a1cfaab10040be89eb
-
SHA256
7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40
-
SHA512
3bad0b969983376e7c8f2c3f64e1fa1b17a518d1b91f0b133295d3723afc26cc89dd3cda72bb214e7af20b15c5c5a7c3988663c7935bd13d45fcd002308e0370
-
SSDEEP
3072:pLuHb+MnKj8scDb4vTy0ePBwn8Ml+q7KLfjOkf6:pLsKjSkTMpUGq2jSkf
Static task
static1
Behavioral task
behavioral1
Sample
7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40
-
Size
124KB
-
MD5
a1864815fc365c676580eb540e2de8b3
-
SHA1
e9422c6e7e28e21bbbea22a1cfaab10040be89eb
-
SHA256
7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40
-
SHA512
3bad0b969983376e7c8f2c3f64e1fa1b17a518d1b91f0b133295d3723afc26cc89dd3cda72bb214e7af20b15c5c5a7c3988663c7935bd13d45fcd002308e0370
-
SSDEEP
3072:pLuHb+MnKj8scDb4vTy0ePBwn8Ml+q7KLfjOkf6:pLsKjSkTMpUGq2jSkf
-
Detects Strela Stealer payload
-