General
-
Target
c2b45c2ade8101b3ff82eddeb89142788174f27d82334569d0c0c60c3bf32b68
-
Size
178KB
-
Sample
240724-c6sslstdrr
-
MD5
faebf03893923035c23378c9f39bcd8a
-
SHA1
034fbf2520158e513c4b1a6235b508c8bfd80e91
-
SHA256
c2b45c2ade8101b3ff82eddeb89142788174f27d82334569d0c0c60c3bf32b68
-
SHA512
dc771f9b2715a9ffcf9fb33f7c5e3fbf9c0e46322e59966fd660890d68a3afdf70de6bb5c1cbb331539c48b7c605675e986abbcecb0c5485632faa0fbf39f229
-
SSDEEP
3072:Y8Xc/jpUzb9QG1et0KkzwWeBX5qmEyhxivAXKMv1yx7hSTawV+AtDG+B4:j1g0KX1X5qibi0Tv1yMTi+m
Static task
static1
Behavioral task
behavioral1
Sample
c2b45c2ade8101b3ff82eddeb89142788174f27d82334569d0c0c60c3bf32b68.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
45.9.74.36
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
c2b45c2ade8101b3ff82eddeb89142788174f27d82334569d0c0c60c3bf32b68
-
Size
178KB
-
MD5
faebf03893923035c23378c9f39bcd8a
-
SHA1
034fbf2520158e513c4b1a6235b508c8bfd80e91
-
SHA256
c2b45c2ade8101b3ff82eddeb89142788174f27d82334569d0c0c60c3bf32b68
-
SHA512
dc771f9b2715a9ffcf9fb33f7c5e3fbf9c0e46322e59966fd660890d68a3afdf70de6bb5c1cbb331539c48b7c605675e986abbcecb0c5485632faa0fbf39f229
-
SSDEEP
3072:Y8Xc/jpUzb9QG1et0KkzwWeBX5qmEyhxivAXKMv1yx7hSTawV+AtDG+B4:j1g0KX1X5qibi0Tv1yMTi+m
-
Detects Strela Stealer payload
-