General

  • Target

    2540-0-0x000007FEF7340000-0x000007FEF7370000-memory.dmp

  • Size

    192KB

  • MD5

    f3ea54415b024ba43b715928c5cfa012

  • SHA1

    dc514218c1d4eb139e61f822c977311d37d41b41

  • SHA256

    a9e7b28165a3bf9d8b259db477bd1c8da667690dbe7436df5ec07ea83fac65f7

  • SHA512

    e7e40b8476c22b2b1665a8e484dd10dfc26bba6ec198f9e449d599aa687a8b489841902170dfa4b8e2bac2a5ff7106fe737d5bfb14bd2f011844427a45db571a

  • SSDEEP

    3072:J78uv42Gm57QrRdArDw3RRQ0DnnmvxC2cFUex9D4QnqdV:J7dw2ZmrRdArDw30Snnmv0JUeoQnq

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.13

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2540-0-0x000007FEF7340000-0x000007FEF7370000-memory.dmp
    .dll windows:4 windows x64 arch:x64


    Headers

    Sections