General
-
Target
075b669e88fe39766d8d53ee67cb4d00N.exe
-
Size
125KB
-
Sample
240716-y9g16sydqk
-
MD5
075b669e88fe39766d8d53ee67cb4d00
-
SHA1
8ce974e830abb0df3cb81e86c706cded9966898d
-
SHA256
9d063e5f5580b6e29f81454196c70622b52ee1a083a73d843e0e6f2194e0c805
-
SHA512
6872e751d5268ce32d0d71b2d941140bfaaa6dfd92bc3afacbc0405cdaf1e68b89b53143446af8bedd6bbfd75a714f38be3d68c36ae867a59bdb27edae0df4a7
-
SSDEEP
3072:CBYt5FIeoxXDPT8DRcuOY3BYLOV6snxsQ0F:GYtHiPT8DRT32YT0F
Static task
static1
Behavioral task
behavioral1
Sample
075b669e88fe39766d8d53ee67cb4d00N.dll
Resource
win7-20240704-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
075b669e88fe39766d8d53ee67cb4d00N.exe
-
Size
125KB
-
MD5
075b669e88fe39766d8d53ee67cb4d00
-
SHA1
8ce974e830abb0df3cb81e86c706cded9966898d
-
SHA256
9d063e5f5580b6e29f81454196c70622b52ee1a083a73d843e0e6f2194e0c805
-
SHA512
6872e751d5268ce32d0d71b2d941140bfaaa6dfd92bc3afacbc0405cdaf1e68b89b53143446af8bedd6bbfd75a714f38be3d68c36ae867a59bdb27edae0df4a7
-
SSDEEP
3072:CBYt5FIeoxXDPT8DRcuOY3BYLOV6snxsQ0F:GYtHiPT8DRT32YT0F
-
Detects Strela Stealer payload
-