General
-
Target
5ae75b8397d89ad209984ca27603a954a2615bd677777fe5ff6a0d5a1164c39b.exe
-
Size
182KB
-
Sample
241127-wl1ghazpdq
-
MD5
f9ca965cf1b4b24fbcc44d49dee758d6
-
SHA1
856b8c6c65939296cf07e68267127a0b523c415e
-
SHA256
5ae75b8397d89ad209984ca27603a954a2615bd677777fe5ff6a0d5a1164c39b
-
SHA512
40a899ef576dbf2bf54b20e7c1e8379b857130120ad53f4f7037f57e9438328820623753b9bb1c14e3f6c557603dc290d5e402f4dbc9ecbdebc5f86e8cee8687
-
SSDEEP
3072:1a3gN0KjMqOdLdrjeiltOAWSBlF+2kr4Nv4ILEH0T8QfywWWEISDKO:M3gNFw3L1j77pBrK4lLnTfKl
Static task
static1
Behavioral task
behavioral1
Sample
5ae75b8397d89ad209984ca27603a954a2615bd677777fe5ff6a0d5a1164c39b.dll
Resource
win7-20240903-en
Malware Config
Extracted
strela
94.159.113.79
-
url_path
/up.php
Targets
-
-
Target
5ae75b8397d89ad209984ca27603a954a2615bd677777fe5ff6a0d5a1164c39b.exe
-
Size
182KB
-
MD5
f9ca965cf1b4b24fbcc44d49dee758d6
-
SHA1
856b8c6c65939296cf07e68267127a0b523c415e
-
SHA256
5ae75b8397d89ad209984ca27603a954a2615bd677777fe5ff6a0d5a1164c39b
-
SHA512
40a899ef576dbf2bf54b20e7c1e8379b857130120ad53f4f7037f57e9438328820623753b9bb1c14e3f6c557603dc290d5e402f4dbc9ecbdebc5f86e8cee8687
-
SSDEEP
3072:1a3gN0KjMqOdLdrjeiltOAWSBlF+2kr4Nv4ILEH0T8QfywWWEISDKO:M3gNFw3L1j77pBrK4lLnTfKl
-
Detects Strela Stealer payload
-
Strela family
-