General
-
Target
704a36c6450f16a8239c19b477629690N.exe
-
Size
163KB
-
Sample
240801-nl3ymayblk
-
MD5
704a36c6450f16a8239c19b477629690
-
SHA1
8b69e5a00dbca67836ff1431ec16c8e061789c60
-
SHA256
72ac36ba3352953ce55b658598d5e6eec1ecb01f267904bc01cc98e52e94fb30
-
SHA512
351023494a7cd471bb2a43550e43f6b8b96f80647a4aa9591e732dc78f7914319008c65c8a7e126749b68c5a1da313bd9423b08ce9212708ebba1f1fce2affd2
-
SSDEEP
3072:YPcwaobDqzHqm7pB5XuFhjGzFwOWj6/sXAx9LcPwFW/fKaAAF2vKo7anIohDC/:2K1XuFiFfFsmWnKaAAFLo7aI4DC/
Static task
static1
Behavioral task
behavioral1
Sample
704a36c6450f16a8239c19b477629690N.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
704a36c6450f16a8239c19b477629690N.exe
-
Size
163KB
-
MD5
704a36c6450f16a8239c19b477629690
-
SHA1
8b69e5a00dbca67836ff1431ec16c8e061789c60
-
SHA256
72ac36ba3352953ce55b658598d5e6eec1ecb01f267904bc01cc98e52e94fb30
-
SHA512
351023494a7cd471bb2a43550e43f6b8b96f80647a4aa9591e732dc78f7914319008c65c8a7e126749b68c5a1da313bd9423b08ce9212708ebba1f1fce2affd2
-
SSDEEP
3072:YPcwaobDqzHqm7pB5XuFhjGzFwOWj6/sXAx9LcPwFW/fKaAAF2vKo7anIohDC/:2K1XuFiFfFsmWnKaAAFLo7aI4DC/
-
Detects Strela Stealer payload
-