General

  • Target

    2084-0-0x000007FEF7F30000-0x000007FEF7F60000-memory.dmp

  • Size

    192KB

  • MD5

    b0f84070a988bccd02514f0da8ecfcbe

  • SHA1

    88df9e9fc4b4e02e6a0f582776ed492f5e44ca92

  • SHA256

    53c26f822138def225bf58aae9b2315a5edc39b68b74c80f71b475ad915ec6c3

  • SHA512

    8defe8a5572d1b3b4271a3067ea9b6740a9265b94fb2e9d7e8b9f803d7d26ce637f36e7f4d79351ba1764c3dd856b5cadb93679da3aecd9c86eff85593b58e7e

  • SSDEEP

    3072:BPh1Fk3UEfM57QrRdArDw3RRQ0DnnmvxC2cFUex9D4Qnqdt:pC35fMmrRdArDw30Snnmv0JUeoQnq

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.13

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2084-0-0x000007FEF7F30000-0x000007FEF7F60000-memory.dmp
    .dll windows:4 windows x64 arch:x64


    Headers

    Sections