General
-
Target
c7bde84bbb1df31ade92869e74ffe1d4ba2936adb5487b06765a581d556f624c
-
Size
125KB
-
Sample
240715-peywrsscmh
-
MD5
2a08b3b963d2f78d73a34dc17c9b55dd
-
SHA1
8d6bf649584b45f2ba656f7e6c1e1af26a37d211
-
SHA256
c7bde84bbb1df31ade92869e74ffe1d4ba2936adb5487b06765a581d556f624c
-
SHA512
b10ee38e28afc50f1355ebff15d1cf8ea21409c98e73b5be91038f4da7ced5a2c6c5ae5815a30f35a43a941fcd07c708e5497f174f7bd22e1169fa05323e1954
-
SSDEEP
3072:xqaOVKtZeO+8QtLPtaHrilbDkyXg8fNeSMvoiA:A5VaLobPXg8Utvoi
Static task
static1
Behavioral task
behavioral1
Sample
c7bde84bbb1df31ade92869e74ffe1d4ba2936adb5487b06765a581d556f624c.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
c7bde84bbb1df31ade92869e74ffe1d4ba2936adb5487b06765a581d556f624c
-
Size
125KB
-
MD5
2a08b3b963d2f78d73a34dc17c9b55dd
-
SHA1
8d6bf649584b45f2ba656f7e6c1e1af26a37d211
-
SHA256
c7bde84bbb1df31ade92869e74ffe1d4ba2936adb5487b06765a581d556f624c
-
SHA512
b10ee38e28afc50f1355ebff15d1cf8ea21409c98e73b5be91038f4da7ced5a2c6c5ae5815a30f35a43a941fcd07c708e5497f174f7bd22e1169fa05323e1954
-
SSDEEP
3072:xqaOVKtZeO+8QtLPtaHrilbDkyXg8fNeSMvoiA:A5VaLobPXg8Utvoi
-
Detects Strela Stealer payload
-