General
-
Target
406f00d17668a93e4e79b02c4d11e84074f36a2fc0a718ba06c6b2d78e6bdfc4
-
Size
192KB
-
Sample
240730-1frdvszfkk
-
MD5
4940b9417a31ebdab4265d8f7809a02f
-
SHA1
d348070117194603e2fe1608ac48b39debe63583
-
SHA256
406f00d17668a93e4e79b02c4d11e84074f36a2fc0a718ba06c6b2d78e6bdfc4
-
SHA512
97948bf410e3f35f9c7e6949c7ee395e4f44c367cee3980c9a7ab2d519ffbe542a2cce244f90c11cb8aaf3994a7692a242a5fcdd882883056bd04e72c130c08e
-
SSDEEP
6144:gAUaEVs3XLpkTPRPv0R6N3LrfUhYENmUhD/qWJ:gAd1kTPRPsR6N3kmK/7J
Static task
static1
Behavioral task
behavioral1
Sample
406f00d17668a93e4e79b02c4d11e84074f36a2fc0a718ba06c6b2d78e6bdfc4.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
406f00d17668a93e4e79b02c4d11e84074f36a2fc0a718ba06c6b2d78e6bdfc4
-
Size
192KB
-
MD5
4940b9417a31ebdab4265d8f7809a02f
-
SHA1
d348070117194603e2fe1608ac48b39debe63583
-
SHA256
406f00d17668a93e4e79b02c4d11e84074f36a2fc0a718ba06c6b2d78e6bdfc4
-
SHA512
97948bf410e3f35f9c7e6949c7ee395e4f44c367cee3980c9a7ab2d519ffbe542a2cce244f90c11cb8aaf3994a7692a242a5fcdd882883056bd04e72c130c08e
-
SSDEEP
6144:gAUaEVs3XLpkTPRPv0R6N3LrfUhYENmUhD/qWJ:gAd1kTPRPsR6N3kmK/7J
-
Detects Strela Stealer payload
-