General
-
Target
0de858b9ecb5b4a1427f618f7b2d5240N.exe
-
Size
124KB
-
Sample
240715-zyt22ayhrm
-
MD5
0de858b9ecb5b4a1427f618f7b2d5240
-
SHA1
15e649f2c1d2b2f191388e6045ab34095af9fb33
-
SHA256
4441d586e9cbf50db59c73fca4d7e917951704b549fe40440647b90b01e22611
-
SHA512
240ecacf76abe4a0cb1b9d82e6e46836f1b5817fd71e1f3df0dceebf9d85963a4d887647685dc5bc0c07c89e8e0f3ebe9f7d3a9c626ab0f9971561732e1a66c9
-
SSDEEP
3072:SRuNlpTTctwfBmf3B41rLaUFnl6yiIq75xDpwqp:9HNMwfcp4NZFnlpe7ntx
Static task
static1
Behavioral task
behavioral1
Sample
0de858b9ecb5b4a1427f618f7b2d5240N.dll
Resource
win7-20240705-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
0de858b9ecb5b4a1427f618f7b2d5240N.exe
-
Size
124KB
-
MD5
0de858b9ecb5b4a1427f618f7b2d5240
-
SHA1
15e649f2c1d2b2f191388e6045ab34095af9fb33
-
SHA256
4441d586e9cbf50db59c73fca4d7e917951704b549fe40440647b90b01e22611
-
SHA512
240ecacf76abe4a0cb1b9d82e6e46836f1b5817fd71e1f3df0dceebf9d85963a4d887647685dc5bc0c07c89e8e0f3ebe9f7d3a9c626ab0f9971561732e1a66c9
-
SSDEEP
3072:SRuNlpTTctwfBmf3B41rLaUFnl6yiIq75xDpwqp:9HNMwfcp4NZFnlpe7ntx
-
Detects Strela Stealer payload
-