General
-
Target
ec54302fa9d93f8ade25832f7bfb8c22b665d971f4287c9c5465c7c288f056aa
-
Size
147KB
-
Sample
241125-fycyzazqfy
-
MD5
d215572a3879d40b815e99b5a311fc03
-
SHA1
74ff0e07879e690e4eae5e38f7085c7a3aba3e4c
-
SHA256
ec54302fa9d93f8ade25832f7bfb8c22b665d971f4287c9c5465c7c288f056aa
-
SHA512
0462cc75a7042c51df4e63980ebb69b1328a9a62ff39875ba1c2ad9b155d2b73db8e8586cce8f8770fb7f1ce2363fc27d1db8b53edde53aeeef4900fdd8d15f0
-
SSDEEP
3072:ptNVraccu1jqnl8r0Hlq+rLRFG5Q6YWeJtB8GQWfMl6JOx:fraICl84HlJfHG5Q6YVBzQ3kJ
Static task
static1
Behavioral task
behavioral1
Sample
ec54302fa9d93f8ade25832f7bfb8c22b665d971f4287c9c5465c7c288f056aa.dll
Resource
win7-20240903-en
Malware Config
Extracted
strela
94.159.113.79
-
url_path
/up.php
Targets
-
-
Target
ec54302fa9d93f8ade25832f7bfb8c22b665d971f4287c9c5465c7c288f056aa
-
Size
147KB
-
MD5
d215572a3879d40b815e99b5a311fc03
-
SHA1
74ff0e07879e690e4eae5e38f7085c7a3aba3e4c
-
SHA256
ec54302fa9d93f8ade25832f7bfb8c22b665d971f4287c9c5465c7c288f056aa
-
SHA512
0462cc75a7042c51df4e63980ebb69b1328a9a62ff39875ba1c2ad9b155d2b73db8e8586cce8f8770fb7f1ce2363fc27d1db8b53edde53aeeef4900fdd8d15f0
-
SSDEEP
3072:ptNVraccu1jqnl8r0Hlq+rLRFG5Q6YWeJtB8GQWfMl6JOx:fraICl84HlJfHG5Q6YVBzQ3kJ
-
Detects Strela Stealer payload
-
Strela family
-