General
-
Target
d3a7ae80871f97610f7b516d214686c2eeb7f9de61b6b78ef69782e9e94640ba
-
Size
163KB
-
Sample
240728-e9x8lsyckp
-
MD5
b5d8e98ae5361cbede1ff73113d29a39
-
SHA1
3f3dba6b6c60170d87bc6909c43b8aedab72b21d
-
SHA256
d3a7ae80871f97610f7b516d214686c2eeb7f9de61b6b78ef69782e9e94640ba
-
SHA512
c40f3729732d338e48db2bee166797d429bcaacc85fb14116d3d29b666ebb522e8a3f5aefbfdc737438b3843efc53391a829190e630133dc78e92a42c42197ac
-
SSDEEP
3072:gSwhQ88nvWr+8Ve+enyfDllr9N54rkbqvNQoRuLPA1BBL:NnvWFetyfRlrv5h9oY7CBL
Static task
static1
Behavioral task
behavioral1
Sample
d3a7ae80871f97610f7b516d214686c2eeb7f9de61b6b78ef69782e9e94640ba.dll
Resource
win7-20240704-en
Malware Config
Extracted
strela
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
d3a7ae80871f97610f7b516d214686c2eeb7f9de61b6b78ef69782e9e94640ba
-
Size
163KB
-
MD5
b5d8e98ae5361cbede1ff73113d29a39
-
SHA1
3f3dba6b6c60170d87bc6909c43b8aedab72b21d
-
SHA256
d3a7ae80871f97610f7b516d214686c2eeb7f9de61b6b78ef69782e9e94640ba
-
SHA512
c40f3729732d338e48db2bee166797d429bcaacc85fb14116d3d29b666ebb522e8a3f5aefbfdc737438b3843efc53391a829190e630133dc78e92a42c42197ac
-
SSDEEP
3072:gSwhQ88nvWr+8Ve+enyfDllr9N54rkbqvNQoRuLPA1BBL:NnvWFetyfRlrv5h9oY7CBL
-
Detects Strela Stealer payload
-