Analysis
-
max time kernel
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 22:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
34643d57eaa9739d4f965c49c96f1d50N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
34643d57eaa9739d4f965c49c96f1d50N.dll
-
Size
124KB
-
MD5
34643d57eaa9739d4f965c49c96f1d50
-
SHA1
43d128c80c371e3c626d8341e502afa4ff077b1d
-
SHA256
fa62bc15b8420a04a931f345e44e74e3ec0ff4b4b395655477be447425919f57
-
SHA512
7592f9db6ec9507c838ce38bb7f771f426f92bbe073ac64cbcaf4720fb50f52bf21ae81ed711c98316a204aa21aa5c0f96ef3780b9d8c95f4ce59c40406179cd
-
SSDEEP
3072:Arqi2HfJz32izSexs2v4DQbWi41+mlBRtC1n1Q9d+IiFa5Thr45cLZIxIg:ArqJ/Jz32izS2VWixmbmx1egoVNw
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/5112-1-0x000001F5C37A0000-0x000001F5C37C2000-memory.dmp family_strela behavioral2/memory/5112-0-0x000001F5C37A0000-0x000001F5C37C2000-memory.dmp family_strela