General
-
Target
f58dbf39497d9485fa7fdf88a5bc2c44f22284ca117437a8137070e4c0567135N
-
Size
458KB
-
Sample
241107-ljyvsayqe1
-
MD5
280dfd8638e01c98efffff6b3ff5c390
-
SHA1
49a1b97c2f393976dd59ebd3f11b00434e647396
-
SHA256
f58dbf39497d9485fa7fdf88a5bc2c44f22284ca117437a8137070e4c0567135
-
SHA512
7651cc6da136fc49dc33433750cf3ce0bbd53f0cf26b7b842e92dd6343cd66bf02455f4ba3bdf398fcce39a55d9a82be554c9c197352ec57d22e2e51bd19efac
-
SSDEEP
12288:LS1kO1HiE+DwaQyfcjb2gCo5TQsY4xg/LJvQ:LUiVktb2gxksY4WL
Static task
static1
Behavioral task
behavioral1
Sample
f58dbf39497d9485fa7fdf88a5bc2c44f22284ca117437a8137070e4c0567135N.dll
Resource
win7-20240903-en
Malware Config
Extracted
strela
94.159.113.82
-
url_path
/server.php
Targets
-
-
Target
f58dbf39497d9485fa7fdf88a5bc2c44f22284ca117437a8137070e4c0567135N
-
Size
458KB
-
MD5
280dfd8638e01c98efffff6b3ff5c390
-
SHA1
49a1b97c2f393976dd59ebd3f11b00434e647396
-
SHA256
f58dbf39497d9485fa7fdf88a5bc2c44f22284ca117437a8137070e4c0567135
-
SHA512
7651cc6da136fc49dc33433750cf3ce0bbd53f0cf26b7b842e92dd6343cd66bf02455f4ba3bdf398fcce39a55d9a82be554c9c197352ec57d22e2e51bd19efac
-
SSDEEP
12288:LS1kO1HiE+DwaQyfcjb2gCo5TQsY4xg/LJvQ:LUiVktb2gxksY4WL
-
Detects Strela Stealer payload
-
Strela family
-