General
-
Target
466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4N
-
Size
562KB
-
Sample
241110-rxshtaydml
-
MD5
9c9cfdcf546f5408e8f969cd47c28140
-
SHA1
3d22f892b8eb0d6ce181f91c1d8a7bdc4a2c0622
-
SHA256
466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4
-
SHA512
cd7e4f0e0c4642769140e655e56ceaa81cc23483119de187079155324bdbfa007a0ce5fafed3188e0582b2a2f2e995533d1dea941e7c9ef5f76c457b1a0d495b
-
SSDEEP
12288:VIdFIRWYIUJd2sjBFit4vulDNCr+ckscRCnOsIqHUqQ:fWYIqd2sjLu5R2++kszUq
Static task
static1
Behavioral task
behavioral1
Sample
466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4N.dll
Resource
win7-20240903-en
Malware Config
Extracted
strela
94.159.113.86
-
url_path
/server.php
Targets
-
-
Target
466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4N
-
Size
562KB
-
MD5
9c9cfdcf546f5408e8f969cd47c28140
-
SHA1
3d22f892b8eb0d6ce181f91c1d8a7bdc4a2c0622
-
SHA256
466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4
-
SHA512
cd7e4f0e0c4642769140e655e56ceaa81cc23483119de187079155324bdbfa007a0ce5fafed3188e0582b2a2f2e995533d1dea941e7c9ef5f76c457b1a0d495b
-
SSDEEP
12288:VIdFIRWYIUJd2sjBFit4vulDNCr+ckscRCnOsIqHUqQ:fWYIqd2sjLu5R2++kszUq
-
Detects Strela Stealer payload
-
Strela family
-