General
-
Target
0ac15be1b48e53b9f35fd49253bfcc60N.exe
-
Size
189KB
-
Sample
240727-121jnavame
-
MD5
0ac15be1b48e53b9f35fd49253bfcc60
-
SHA1
2cd4cdd41e918842e78ec64209bd99ccc5b17e78
-
SHA256
3eacf23816ff8d2067532c4c2b65457a78d234d31bd79dd42fe4b75c30c9106b
-
SHA512
690c4b59797f7d28901b078ab10c6cb69de35f153e92892dda566dbac4c9db52b0675a404d34a99697c14c2fe62d8bb144bd4cd232576002b115b991c1e9d6f7
-
SSDEEP
3072:hMQxvrkzcVyvJCmHr6MECXWyYW5ri3q57URJoI1bnA3jOB5Dfc/VJMO9NVoK9MyO:VTkQu1aCXWyYEia5Uvo1zg5Dfc/VJ19M
Static task
static1
Behavioral task
behavioral1
Sample
0ac15be1b48e53b9f35fd49253bfcc60N.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
0ac15be1b48e53b9f35fd49253bfcc60N.exe
-
Size
189KB
-
MD5
0ac15be1b48e53b9f35fd49253bfcc60
-
SHA1
2cd4cdd41e918842e78ec64209bd99ccc5b17e78
-
SHA256
3eacf23816ff8d2067532c4c2b65457a78d234d31bd79dd42fe4b75c30c9106b
-
SHA512
690c4b59797f7d28901b078ab10c6cb69de35f153e92892dda566dbac4c9db52b0675a404d34a99697c14c2fe62d8bb144bd4cd232576002b115b991c1e9d6f7
-
SSDEEP
3072:hMQxvrkzcVyvJCmHr6MECXWyYW5ri3q57URJoI1bnA3jOB5Dfc/VJMO9NVoK9MyO:VTkQu1aCXWyYEia5Uvo1zg5Dfc/VJ19M
-
Detects Strela Stealer payload
-