General
-
Target
5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c
-
Size
123KB
-
Sample
240715-pr8xha1fnl
-
MD5
d864ca9c9c010fb3ca8d878f21743c1f
-
SHA1
e8929100e3334611e1a25b46f6356ade6d9901ab
-
SHA256
5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c
-
SHA512
30f31a3e9be82772a545606fa2c7e2c3f2e05c12ca54a65efb15ee645e5471357770917a08bb5be2c8bc366c5b8d394c27e8d5517cb7c010ee82cfa8fd7acbb7
-
SSDEEP
3072:GAzLRtTBhKXgQ0x5HYQtcJWHF+HHB0dq7u:jztxBhKXT/QKeeh0su
Static task
static1
Behavioral task
behavioral1
Sample
5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c
-
Size
123KB
-
MD5
d864ca9c9c010fb3ca8d878f21743c1f
-
SHA1
e8929100e3334611e1a25b46f6356ade6d9901ab
-
SHA256
5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c
-
SHA512
30f31a3e9be82772a545606fa2c7e2c3f2e05c12ca54a65efb15ee645e5471357770917a08bb5be2c8bc366c5b8d394c27e8d5517cb7c010ee82cfa8fd7acbb7
-
SSDEEP
3072:GAzLRtTBhKXgQ0x5HYQtcJWHF+HHB0dq7u:jztxBhKXT/QKeeh0su
-
Detects Strela Stealer payload
-