General
-
Target
d9dcf08bc9ed6e44faac84acde3d4fbad3ba583a05d751326b80e6edce89aae7
-
Size
125KB
-
Sample
240715-phex3azflq
-
MD5
4a0876d21c445705e75d6450f7e0a221
-
SHA1
a078e9a9408a536c2c6fe794ad87699b77c16e81
-
SHA256
d9dcf08bc9ed6e44faac84acde3d4fbad3ba583a05d751326b80e6edce89aae7
-
SHA512
6817c6f601c4c003b0e4b506eb20fb40949eebea86b74f059a02a76550fccc4bc80269ce4f0874377995673bb8e093c07e78274dbc2d701074d356dc534981ec
-
SSDEEP
3072:Dnq13U3d4KcRcGL1qt20r4hKiL8Rtmkr/k04MQ+N:Dq14oRPWNiQtxrspMvN
Static task
static1
Behavioral task
behavioral1
Sample
d9dcf08bc9ed6e44faac84acde3d4fbad3ba583a05d751326b80e6edce89aae7.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
d9dcf08bc9ed6e44faac84acde3d4fbad3ba583a05d751326b80e6edce89aae7
-
Size
125KB
-
MD5
4a0876d21c445705e75d6450f7e0a221
-
SHA1
a078e9a9408a536c2c6fe794ad87699b77c16e81
-
SHA256
d9dcf08bc9ed6e44faac84acde3d4fbad3ba583a05d751326b80e6edce89aae7
-
SHA512
6817c6f601c4c003b0e4b506eb20fb40949eebea86b74f059a02a76550fccc4bc80269ce4f0874377995673bb8e093c07e78274dbc2d701074d356dc534981ec
-
SSDEEP
3072:Dnq13U3d4KcRcGL1qt20r4hKiL8Rtmkr/k04MQ+N:Dq14oRPWNiQtxrspMvN
-
Detects Strela Stealer payload
-