General
-
Target
1d004e4b4f988739e5a26e4fc83caa40N.exe
-
Size
178KB
-
Sample
240721-2ab8eszenr
-
MD5
1d004e4b4f988739e5a26e4fc83caa40
-
SHA1
314cbc8aed065d8ee42803d4884ad2c3ad0cd1a0
-
SHA256
646e85a8e1a96ed85823553de8badaad2a3f2a7439ac2bbcf1ed62507a005445
-
SHA512
b438a9c1a9b30285bf49d8fd6869b5bb67a49599e4262b9a251fde2348ec5dc488f45cd69bad152830da2c2516ea14138524783d86527db4a2779b8ea15b141d
-
SSDEEP
3072:LYYMhX7m5WzyOIpQaxLR0YxBsi17DOWNUeOyEC7f:UhrCWGOI1xqYgi1/75OG7f
Static task
static1
Behavioral task
behavioral1
Sample
1d004e4b4f988739e5a26e4fc83caa40N.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
45.9.74.36
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
1d004e4b4f988739e5a26e4fc83caa40N.exe
-
Size
178KB
-
MD5
1d004e4b4f988739e5a26e4fc83caa40
-
SHA1
314cbc8aed065d8ee42803d4884ad2c3ad0cd1a0
-
SHA256
646e85a8e1a96ed85823553de8badaad2a3f2a7439ac2bbcf1ed62507a005445
-
SHA512
b438a9c1a9b30285bf49d8fd6869b5bb67a49599e4262b9a251fde2348ec5dc488f45cd69bad152830da2c2516ea14138524783d86527db4a2779b8ea15b141d
-
SSDEEP
3072:LYYMhX7m5WzyOIpQaxLR0YxBsi17DOWNUeOyEC7f:UhrCWGOI1xqYgi1/75OG7f
-
Detects Strela Stealer payload
-