General
-
Target
7d82c6b03efa248c434f9aa92d017a313b8cc7e083ebd00b564fce31d4390f29
-
Size
124KB
-
Sample
240715-phxg4sshre
-
MD5
c41afe38495dc5a71af847838238a40d
-
SHA1
fc8a3e02f23ae5e1a3480d5ab41c37f51ef03a45
-
SHA256
7d82c6b03efa248c434f9aa92d017a313b8cc7e083ebd00b564fce31d4390f29
-
SHA512
4d8ffb00da6b43960ad1540b79a0a215686e33c47524de33b98bd1d769f5991f0144e9c7c747ff5daec81db2599b7c5536cbd4be2d471fc452e7858a06a907b0
-
SSDEEP
3072:wG9bATOyKC+jEHbSrLOJOHgdg6aoWHk5jVROaapEx:wGNATOHC+jkbQ3AZaock5jTOaGE
Static task
static1
Behavioral task
behavioral1
Sample
7d82c6b03efa248c434f9aa92d017a313b8cc7e083ebd00b564fce31d4390f29.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
7d82c6b03efa248c434f9aa92d017a313b8cc7e083ebd00b564fce31d4390f29
-
Size
124KB
-
MD5
c41afe38495dc5a71af847838238a40d
-
SHA1
fc8a3e02f23ae5e1a3480d5ab41c37f51ef03a45
-
SHA256
7d82c6b03efa248c434f9aa92d017a313b8cc7e083ebd00b564fce31d4390f29
-
SHA512
4d8ffb00da6b43960ad1540b79a0a215686e33c47524de33b98bd1d769f5991f0144e9c7c747ff5daec81db2599b7c5536cbd4be2d471fc452e7858a06a907b0
-
SSDEEP
3072:wG9bATOyKC+jEHbSrLOJOHgdg6aoWHk5jVROaapEx:wGNATOHC+jkbQ3AZaock5jTOaGE
-
Detects Strela Stealer payload
-