General
-
Target
70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b
-
Size
125KB
-
Sample
240715-payefaxhqn
-
MD5
6bfde1fe74232254a3bc060b5d67177a
-
SHA1
8eb0a0e5cd3eecf1885e8be7a2689c3fd67754b3
-
SHA256
70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b
-
SHA512
c131421e99c60f2653960c2bd58474fa92b29400e5845f2d303c62eeb234cc70953992422cf0828b7895b124519406543d9c7b966021e36ecb89e3a4fa72f260
-
SSDEEP
3072:BbQy+W5MeOgs8J0qD59Z09117ju923PaFoOMkC/IZXh+T36bQLt535ZitP:Bcy+W+gffmXuo3PoMkC/IFh+TOQLz3Ot
Static task
static1
Behavioral task
behavioral1
Sample
70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b
-
Size
125KB
-
MD5
6bfde1fe74232254a3bc060b5d67177a
-
SHA1
8eb0a0e5cd3eecf1885e8be7a2689c3fd67754b3
-
SHA256
70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b
-
SHA512
c131421e99c60f2653960c2bd58474fa92b29400e5845f2d303c62eeb234cc70953992422cf0828b7895b124519406543d9c7b966021e36ecb89e3a4fa72f260
-
SSDEEP
3072:BbQy+W5MeOgs8J0qD59Z09117ju923PaFoOMkC/IZXh+T36bQLt535ZitP:Bcy+W+gffmXuo3PoMkC/IFh+TOQLz3Ot
-
Detects Strela Stealer payload
-