General
-
Target
9049fdd91e2f576376b6eee440ea2ccdbe1cb8fa2eec3b741b6ac41d69c5a4c7
-
Size
124KB
-
Sample
240715-pr49batgpc
-
MD5
4a976c129a000c88acca320d576b6a3d
-
SHA1
20eeabd8f4b8919761067e2e86becd841822a820
-
SHA256
9049fdd91e2f576376b6eee440ea2ccdbe1cb8fa2eec3b741b6ac41d69c5a4c7
-
SHA512
c5d1ce5b037c8ed023deb6f2c500b30a38d172a7cd9a8c97f93c46afc735aa99e462ecd1d8547d1c694355329405206d5875df97d64b565346e7ae0684860238
-
SSDEEP
3072:CfFfVO99MrOY7fV6yip/Et2Z4FiCf8x2y6+odY:C1VOTMrOY85Kt2Z4oCk
Static task
static1
Behavioral task
behavioral1
Sample
9049fdd91e2f576376b6eee440ea2ccdbe1cb8fa2eec3b741b6ac41d69c5a4c7.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
strela
45.9.74.32
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Targets
-
-
Target
9049fdd91e2f576376b6eee440ea2ccdbe1cb8fa2eec3b741b6ac41d69c5a4c7
-
Size
124KB
-
MD5
4a976c129a000c88acca320d576b6a3d
-
SHA1
20eeabd8f4b8919761067e2e86becd841822a820
-
SHA256
9049fdd91e2f576376b6eee440ea2ccdbe1cb8fa2eec3b741b6ac41d69c5a4c7
-
SHA512
c5d1ce5b037c8ed023deb6f2c500b30a38d172a7cd9a8c97f93c46afc735aa99e462ecd1d8547d1c694355329405206d5875df97d64b565346e7ae0684860238
-
SSDEEP
3072:CfFfVO99MrOY7fV6yip/Et2Z4FiCf8x2y6+odY:C1VOTMrOY85Kt2Z4oCk
-
Detects Strela Stealer payload
-