Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 19:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10.dll
Resource
win7-20240705-en
2 signatures
150 seconds
General
-
Target
10.dll
-
Size
156KB
-
MD5
c6098b706ef69eb75633016966ac0579
-
SHA1
211afcb062049220e39f4915b57ed7a21d654a7d
-
SHA256
d4ef23361e77042c75e0efaadfab90b926222f912e484fc4c62982fb4995578c
-
SHA512
c05131cab725b9feed47f965c5209a9cddc4623a2cd426cf2dfedcfe53403fa29824b6b7f1d4f477c28c2a1b275c2d83e8ea3909a4e04c404e49bf04a6db8a33
-
SSDEEP
3072:+vUuWabpwMs+Qh1tRvEGIsV/QYVFw+pYm9EqVDJo+meNXdbrn:W7WabphKRvP5VlPw+pvHBRm2
Malware Config
Extracted
Family
strela
C2
45.9.74.13
Attributes
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/2420-0-0x00007FFF7EFB0000-0x00007FFF7EFE0000-memory.dmp family_strela behavioral2/memory/2420-1-0x00000000030C0000-0x00000000030E2000-memory.dmp family_strela