General
-
Target
788c3ab40bbfd1dc19ae8a6611f9f050N.exe
-
Size
124KB
-
Sample
240716-gcwpmaxdjn
-
MD5
788c3ab40bbfd1dc19ae8a6611f9f050
-
SHA1
dbb33d9c772e44ee92184bb47782ab966d202192
-
SHA256
489a0d37ee2ab8cc7ade2e97c500631d9c6f9749add6ef2a149a741e9e948b19
-
SHA512
606d6147fe8001689a32c64bbf4a8c15865a9d5836703a1c15026d6a15d9d376b7356661e4fc97b10fd30550c29c5f4b512c94d722fe12b4d3b12088ee4fc659
-
SSDEEP
3072:pWHr5xvtvhXj62Ofpjo6iXjrvyTp0A1LDakJnCVErJZKB64NIHK:pCvpNvYjbCrvy7DzzF
Static task
static1
Behavioral task
behavioral1
Sample
788c3ab40bbfd1dc19ae8a6611f9f050N.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
788c3ab40bbfd1dc19ae8a6611f9f050N.exe
-
Size
124KB
-
MD5
788c3ab40bbfd1dc19ae8a6611f9f050
-
SHA1
dbb33d9c772e44ee92184bb47782ab966d202192
-
SHA256
489a0d37ee2ab8cc7ade2e97c500631d9c6f9749add6ef2a149a741e9e948b19
-
SHA512
606d6147fe8001689a32c64bbf4a8c15865a9d5836703a1c15026d6a15d9d376b7356661e4fc97b10fd30550c29c5f4b512c94d722fe12b4d3b12088ee4fc659
-
SSDEEP
3072:pWHr5xvtvhXj62Ofpjo6iXjrvyTp0A1LDakJnCVErJZKB64NIHK:pCvpNvYjbCrvy7DzzF
-
Detects Strela Stealer payload
-