General
-
Target
1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff
-
Size
278KB
-
Sample
241130-vhym3atkfq
-
MD5
f50df05ae6238189b43ce1b1101f67c6
-
SHA1
eee86d826e9ee48ab5dd0c0965277d0868b9df89
-
SHA256
1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff
-
SHA512
817d64e87d12cf76497f5ee482707db24ac0fbe131598636992f7ec0efb240bd3c59079fc9366eae4e03f4e1ce39990b05945e54d580ae9ba1b0f79223d0681f
-
SSDEEP
6144:DMgNhY/LbOxL5HmXQ3w8rr984zwpzNjC7uJ4/VhTU:DtNQIL5Hmg3b6Ewz6U
Static task
static1
Behavioral task
behavioral1
Sample
1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff.dll
Resource
win7-20240708-en
Malware Config
Extracted
strela
94.159.113.48
-
url_path
/server.php
Targets
-
-
Target
1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff
-
Size
278KB
-
MD5
f50df05ae6238189b43ce1b1101f67c6
-
SHA1
eee86d826e9ee48ab5dd0c0965277d0868b9df89
-
SHA256
1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff
-
SHA512
817d64e87d12cf76497f5ee482707db24ac0fbe131598636992f7ec0efb240bd3c59079fc9366eae4e03f4e1ce39990b05945e54d580ae9ba1b0f79223d0681f
-
SSDEEP
6144:DMgNhY/LbOxL5HmXQ3w8rr984zwpzNjC7uJ4/VhTU:DtNQIL5Hmg3b6Ewz6U
-
Detects Strela Stealer payload
-
Strela family
-