General
-
Target
7562e0c3e5fb3fa50c50a132e457f150N.exe
-
Size
161KB
-
Sample
240728-j4n5zawhqk
-
MD5
7562e0c3e5fb3fa50c50a132e457f150
-
SHA1
3353658e7139877a6932edd7398c252fe89728f3
-
SHA256
7d4d02acad5ade50cd1cc8c8ac532d13e7b98b1be5f61faca95b8193ca4de1a3
-
SHA512
7c7e23204ae8158924c720e3eea9873e018c6724bcbe573c0fbc8c32758ed3e14577dd804bf2f4e3eff34efdadb872936dd2cac42dc7ded2d66750f34ec2df81
-
SSDEEP
3072:tv4a39D0jzFHjk/SKvEuU9H4mNQDTh8yJd7p9qhH2pN81d2Zq:qa3l01DkKwQH4mNQDPJR2W80
Static task
static1
Behavioral task
behavioral1
Sample
7562e0c3e5fb3fa50c50a132e457f150N.dll
Resource
win7-20240704-en
Malware Config
Extracted
strela
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
7562e0c3e5fb3fa50c50a132e457f150N.exe
-
Size
161KB
-
MD5
7562e0c3e5fb3fa50c50a132e457f150
-
SHA1
3353658e7139877a6932edd7398c252fe89728f3
-
SHA256
7d4d02acad5ade50cd1cc8c8ac532d13e7b98b1be5f61faca95b8193ca4de1a3
-
SHA512
7c7e23204ae8158924c720e3eea9873e018c6724bcbe573c0fbc8c32758ed3e14577dd804bf2f4e3eff34efdadb872936dd2cac42dc7ded2d66750f34ec2df81
-
SSDEEP
3072:tv4a39D0jzFHjk/SKvEuU9H4mNQDTh8yJd7p9qhH2pN81d2Zq:qa3l01DkKwQH4mNQDPJR2W80
-
Detects Strela Stealer payload
-