General
-
Target
983f02fdf375d84d856d23bab1c5db4e7ac6e15766e3eeeb5505242ae964bbb8
-
Size
160KB
-
Sample
240727-bg7d2azdla
-
MD5
78941de5550e6f0d4ca9e003c7393e2b
-
SHA1
32ad535b03d53fcc3e47188d658f27790fc3ac47
-
SHA256
983f02fdf375d84d856d23bab1c5db4e7ac6e15766e3eeeb5505242ae964bbb8
-
SHA512
5365bc5f694fe43e9e70d81638a863c4ba065b231c2dc064d892bbb19b360a2743db3f107cdc17927ee45a4b1a6feedad34c9077bc5f62b0596ffd33c2b8acdf
-
SSDEEP
3072:VhCxkX/DfEPWxIl1Dfnmp4rxjPToi7mqdWZyud:+I/DsexITDprx78qmq0
Static task
static1
Behavioral task
behavioral1
Sample
983f02fdf375d84d856d23bab1c5db4e7ac6e15766e3eeeb5505242ae964bbb8.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
983f02fdf375d84d856d23bab1c5db4e7ac6e15766e3eeeb5505242ae964bbb8
-
Size
160KB
-
MD5
78941de5550e6f0d4ca9e003c7393e2b
-
SHA1
32ad535b03d53fcc3e47188d658f27790fc3ac47
-
SHA256
983f02fdf375d84d856d23bab1c5db4e7ac6e15766e3eeeb5505242ae964bbb8
-
SHA512
5365bc5f694fe43e9e70d81638a863c4ba065b231c2dc064d892bbb19b360a2743db3f107cdc17927ee45a4b1a6feedad34c9077bc5f62b0596ffd33c2b8acdf
-
SSDEEP
3072:VhCxkX/DfEPWxIl1Dfnmp4rxjPToi7mqdWZyud:+I/DsexITDprx78qmq0
-
Detects Strela Stealer payload
-