Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 23:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c5f70c22889f54f270cd673e64c7200N.dll
Resource
win7-20240704-en
2 signatures
120 seconds
General
-
Target
3c5f70c22889f54f270cd673e64c7200N.dll
-
Size
123KB
-
MD5
3c5f70c22889f54f270cd673e64c7200
-
SHA1
ee987d9440a6e9df733c90b3fec16163e682fc94
-
SHA256
6a87a8779579806663952def578dd103582726ca14bac0b5bb706405b605ee18
-
SHA512
ba61f5d05f8bb4a268de2184c0e478dad4273a3548e40d1279fca243895b703056b96013cc31ac44dd42353e838614c3e8d566ca16c0b1f4737e60c508c39b31
-
SSDEEP
3072:5mDPfcFO/Qg9rl3QALKIe/ILYBwNtxgv:5mDPfn/F9R3IIrLBNLgv
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4752-0-0x000001E92F3C0000-0x000001E92F3E2000-memory.dmp family_strela behavioral2/memory/4752-1-0x000001E92F3C0000-0x000001E92F3E2000-memory.dmp family_strela