General
-
Target
e3a8e9fd8afef027e2163dfbe537c17ee1596fd8e6feb2caaaef97f6a3720e46
-
Size
126KB
-
Sample
240715-prwl6s1flj
-
MD5
d4afb299efe2460f245c15d36ea63e40
-
SHA1
2618a5fe801e8b16cb2b8f7677662ddec8397e97
-
SHA256
e3a8e9fd8afef027e2163dfbe537c17ee1596fd8e6feb2caaaef97f6a3720e46
-
SHA512
083a1a7b08fe1904d141b11e2ba275d106d228daa6936e199957919d404ce6e74c27853f741b56cb963e18bfa94c7ce076b2b1eccbe664927d025f7bc296bf4e
-
SSDEEP
3072:WhZwsJ7V7QLt8euyh3pNcxP1AiLGAiy0+C7:SJJVEB3pNcxP1AiKAi
Static task
static1
Behavioral task
behavioral1
Sample
e3a8e9fd8afef027e2163dfbe537c17ee1596fd8e6feb2caaaef97f6a3720e46.dll
Resource
win10v2004-20240704-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
e3a8e9fd8afef027e2163dfbe537c17ee1596fd8e6feb2caaaef97f6a3720e46
-
Size
126KB
-
MD5
d4afb299efe2460f245c15d36ea63e40
-
SHA1
2618a5fe801e8b16cb2b8f7677662ddec8397e97
-
SHA256
e3a8e9fd8afef027e2163dfbe537c17ee1596fd8e6feb2caaaef97f6a3720e46
-
SHA512
083a1a7b08fe1904d141b11e2ba275d106d228daa6936e199957919d404ce6e74c27853f741b56cb963e18bfa94c7ce076b2b1eccbe664927d025f7bc296bf4e
-
SSDEEP
3072:WhZwsJ7V7QLt8euyh3pNcxP1AiLGAiy0+C7:SJJVEB3pNcxP1AiKAi
-
Detects Strela Stealer payload
-