General
-
Target
10464eaba00ba676880117961b1c75d0N.exe
-
Size
213KB
-
Sample
240720-1ps9taxcqa
-
MD5
10464eaba00ba676880117961b1c75d0
-
SHA1
21f7ee9675b0916b49c4e35986f2cb5bf61e87a6
-
SHA256
543841377cef6c81504bbb616c6a2993d9e0b2c017391c025e57728b78d3de38
-
SHA512
9c37b3cd2b5b36e88874b5b12a3803798ae10f8c982f3534023232423160514a5f6f9eef81b44ec08176d0cd0f1feff0573790cd87975867131ba5bc285f80d9
-
SSDEEP
3072:PUP25lVasgonJw9FRpxNUM0QT/ne4E5OtIcOZijRxUdldZfl2wszJKNyQIW11btK:cP25HasJHQT/hIcOZKxWldujiIS1dUB
Static task
static1
Behavioral task
behavioral1
Sample
10464eaba00ba676880117961b1c75d0N.dll
Resource
win7-20240704-en
Malware Config
Extracted
strela
45.9.74.176
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Targets
-
-
Target
10464eaba00ba676880117961b1c75d0N.exe
-
Size
213KB
-
MD5
10464eaba00ba676880117961b1c75d0
-
SHA1
21f7ee9675b0916b49c4e35986f2cb5bf61e87a6
-
SHA256
543841377cef6c81504bbb616c6a2993d9e0b2c017391c025e57728b78d3de38
-
SHA512
9c37b3cd2b5b36e88874b5b12a3803798ae10f8c982f3534023232423160514a5f6f9eef81b44ec08176d0cd0f1feff0573790cd87975867131ba5bc285f80d9
-
SSDEEP
3072:PUP25lVasgonJw9FRpxNUM0QT/ne4E5OtIcOZijRxUdldZfl2wszJKNyQIW11btK:cP25HasJHQT/hIcOZKxWldujiIS1dUB
-
Detects Strela Stealer payload
-