General

  • Target

    2148-0-0x000007FEFB390000-0x000007FEFB3C0000-memory.dmp

  • Size

    192KB

  • MD5

    b848d526d6b3eaf039f9e386fc13e496

  • SHA1

    79d6a71db02b70ccf5679e2bced0ea01306ceb09

  • SHA256

    77776bfd606560627be3697ece1d54d357ff6a493b8596521f457a824ccae15c

  • SHA512

    ac9d3a2179ae2afe88da6d851eb91fe838b514f076b5deda4a946e989ccc5cd0787acbee2daa100e3cc7058c53c050b1e5b0795f1f334bac6ef09a45c9aa70d3

  • SSDEEP

    3072:9TVyXQpG57QrRdArDw3RRQ0DnnmvxC2cFUex9D4Qnqdk:JVyXjmrRdArDw30Snnmv0JUeoQnq

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.13

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2148-0-0x000007FEFB390000-0x000007FEFB3C0000-memory.dmp
    .dll windows:4 windows x64 arch:x64


    Headers

    Sections