General
-
Target
c7209a8f90434e24d15ed116ac7815a1643dafab7ce3f881050db25982f8d87e.exe
-
Size
135KB
-
Sample
241121-kacqhs1cnr
-
MD5
a341ebb0f6875e5e4de6cbe20b4eddec
-
SHA1
e6939cd45ad707c7c872cb3fad375680f0912f92
-
SHA256
c7209a8f90434e24d15ed116ac7815a1643dafab7ce3f881050db25982f8d87e
-
SHA512
e26cf8a68bfa9c2e43f0222e2f6ccf0944160ffab4c604e8cbcb5fb55a2128cbd9b1e1e89b6e76c6b28cb99d48ac7b3a03f7675e6b296d48435136c204482fc3
-
SSDEEP
3072:XXaahBOY5NCZr5Iot//MfPVLmES4KtTc5UtjcsQYRh4QpsW09gne:XqaPHEZraoNMfPVyEfKZc5U2s3hJc
Static task
static1
Behavioral task
behavioral1
Sample
c7209a8f90434e24d15ed116ac7815a1643dafab7ce3f881050db25982f8d87e.dll
Resource
win7-20240903-en
Malware Config
Extracted
strela
94.159.113.79
-
url_path
/up.php
Targets
-
-
Target
c7209a8f90434e24d15ed116ac7815a1643dafab7ce3f881050db25982f8d87e.exe
-
Size
135KB
-
MD5
a341ebb0f6875e5e4de6cbe20b4eddec
-
SHA1
e6939cd45ad707c7c872cb3fad375680f0912f92
-
SHA256
c7209a8f90434e24d15ed116ac7815a1643dafab7ce3f881050db25982f8d87e
-
SHA512
e26cf8a68bfa9c2e43f0222e2f6ccf0944160ffab4c604e8cbcb5fb55a2128cbd9b1e1e89b6e76c6b28cb99d48ac7b3a03f7675e6b296d48435136c204482fc3
-
SSDEEP
3072:XXaahBOY5NCZr5Iot//MfPVLmES4KtTc5UtjcsQYRh4QpsW09gne:XqaPHEZraoNMfPVyEfKZc5U2s3hJc
-
Detects Strela Stealer payload
-
Strela family
-