General
-
Target
cc623032e47e586597df69c5604a0a20N.exe
-
Size
124KB
-
Sample
240716-q4ygzaycme
-
MD5
cc623032e47e586597df69c5604a0a20
-
SHA1
bda46705bf39c61e499b61d2e51bc8ecdf63906d
-
SHA256
da15be23a940b7d557ee92959446007201d6073369d4591f4f54b51af920f4e5
-
SHA512
e8645b556ec2ca34ba5406697da7f10c2bf42035aa89cb162aae91fa0e85f656f605a6f89e1627989df42ac812ec259d592eb88d038b10dc7de5e9e58d1bcccd
-
SSDEEP
3072:2IKO+7Gxiw/d02l3FMODcpUdleSbfw+rN6ApWmYBhwlmU4Pmb4RrYHQDj:2WIgr/dzlBDcmreSbfw4DYmYBhwlmU/U
Static task
static1
Behavioral task
behavioral1
Sample
cc623032e47e586597df69c5604a0a20N.dll
Resource
win7-20240704-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
cc623032e47e586597df69c5604a0a20N.exe
-
Size
124KB
-
MD5
cc623032e47e586597df69c5604a0a20
-
SHA1
bda46705bf39c61e499b61d2e51bc8ecdf63906d
-
SHA256
da15be23a940b7d557ee92959446007201d6073369d4591f4f54b51af920f4e5
-
SHA512
e8645b556ec2ca34ba5406697da7f10c2bf42035aa89cb162aae91fa0e85f656f605a6f89e1627989df42ac812ec259d592eb88d038b10dc7de5e9e58d1bcccd
-
SSDEEP
3072:2IKO+7Gxiw/d02l3FMODcpUdleSbfw+rN6ApWmYBhwlmU4Pmb4RrYHQDj:2WIgr/dzlBDcmreSbfw4DYmYBhwlmU/U
-
Detects Strela Stealer payload
-