General
-
Target
c2801dc85896e3327c1fd9f3571ed8d7a8e0e6c8c048b7cc0c7d76c8c6cabbc4
-
Size
124KB
-
Sample
240715-pdrfassakh
-
MD5
be6d88e02145cee4ad9fbed85c068323
-
SHA1
f41324fa21df15edff05276ace8c535029dc921b
-
SHA256
c2801dc85896e3327c1fd9f3571ed8d7a8e0e6c8c048b7cc0c7d76c8c6cabbc4
-
SHA512
62796da5e5e9f3711f175a6ceeafad9745009ab79acad083900ab59eb6cc953c888de2c781ce149d6123530edb8fd0c02e078f98ff7fbc0c035ab36943bc7c0c
-
SSDEEP
3072:03SV4dpDdl4IhJOw/ZNYvbFfHXe9mHInI1kTeb2To1e2/+:034Adi+/PSFSmvkHo1ek+
Static task
static1
Behavioral task
behavioral1
Sample
c2801dc85896e3327c1fd9f3571ed8d7a8e0e6c8c048b7cc0c7d76c8c6cabbc4.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
c2801dc85896e3327c1fd9f3571ed8d7a8e0e6c8c048b7cc0c7d76c8c6cabbc4
-
Size
124KB
-
MD5
be6d88e02145cee4ad9fbed85c068323
-
SHA1
f41324fa21df15edff05276ace8c535029dc921b
-
SHA256
c2801dc85896e3327c1fd9f3571ed8d7a8e0e6c8c048b7cc0c7d76c8c6cabbc4
-
SHA512
62796da5e5e9f3711f175a6ceeafad9745009ab79acad083900ab59eb6cc953c888de2c781ce149d6123530edb8fd0c02e078f98ff7fbc0c035ab36943bc7c0c
-
SSDEEP
3072:03SV4dpDdl4IhJOw/ZNYvbFfHXe9mHInI1kTeb2To1e2/+:034Adi+/PSFSmvkHo1ek+
-
Detects Strela Stealer payload
-