General
-
Target
732c311abed223ed976e6049f76310e796874a0c4920f96b4c5a9dff5609002f
-
Size
136KB
-
MD5
3ac291e3f91fa45011242e61915e40a8
-
SHA1
e4564cd64ea7170fe66fc4a3bc7b12abd91f394d
-
SHA256
732c311abed223ed976e6049f76310e796874a0c4920f96b4c5a9dff5609002f
-
SHA512
4c299e865472e757e877d1f76dd77eb71e34d57ab602a983dc508aeef6104eb568bd64c92d7ef7bd6f01c4487e3ac3f393f7b500524e19dfa572ba8ac82a9694
-
SSDEEP
3072:ApN0tKx94s/dhRtks/+Lrv8+MPcl1zG+u+j:YWKx9j/dhcm+3vhdGN+j
Score
10/10
Malware Config
Extracted
Family
strela
C2
45.9.74.36
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule sample family_strela -
Strela family
Files
-
732c311abed223ed976e6049f76310e796874a0c4920f96b4c5a9dff5609002f