General
-
Target
eb9752c47dfb2ea59d7c7d3ce991bae0N.exe
-
Size
177KB
-
Sample
240804-m77chayakh
-
MD5
eb9752c47dfb2ea59d7c7d3ce991bae0
-
SHA1
b2841d1c3cb12bad359072337b7715e1a58a8719
-
SHA256
cdce4554cd7e78bb937fc53b2281c51dc98b37552da3531b0333a28fcbeb998e
-
SHA512
60a167ae5aa1c0f707921024bd21d44018f79cd05633d4c01cbf953b54ec18f1ed85797de67923a042dc7310ae9d4018190e6dbd733d39afb4415b08ee5ad669
-
SSDEEP
3072:0coZxWopfaZAxPPuDd98LT4moCWTAQRxGfXMY9jPhH6LIgJGZWvQGvCsSN1:HoZxWoRSyXwu4bTRxGpjZHZZSQGv
Static task
static1
Behavioral task
behavioral1
Sample
eb9752c47dfb2ea59d7c7d3ce991bae0N.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
eb9752c47dfb2ea59d7c7d3ce991bae0N.exe
-
Size
177KB
-
MD5
eb9752c47dfb2ea59d7c7d3ce991bae0
-
SHA1
b2841d1c3cb12bad359072337b7715e1a58a8719
-
SHA256
cdce4554cd7e78bb937fc53b2281c51dc98b37552da3531b0333a28fcbeb998e
-
SHA512
60a167ae5aa1c0f707921024bd21d44018f79cd05633d4c01cbf953b54ec18f1ed85797de67923a042dc7310ae9d4018190e6dbd733d39afb4415b08ee5ad669
-
SSDEEP
3072:0coZxWopfaZAxPPuDd98LT4moCWTAQRxGfXMY9jPhH6LIgJGZWvQGvCsSN1:HoZxWoRSyXwu4bTRxGpjZHZZSQGv
-
Detects Strela Stealer payload
-