Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 22:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
18891e001b483398144ccfc0f87bcd50N.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
120 seconds
General
-
Target
18891e001b483398144ccfc0f87bcd50N.dll
-
Size
123KB
-
MD5
18891e001b483398144ccfc0f87bcd50
-
SHA1
e4314e72a7d10610ea3af808bcc3501196782ef2
-
SHA256
906e84cdda3a8550d3330af207200cdbef23993afbada659b8bd5402d503544a
-
SHA512
fb58e8a938a6d0d3893ec05bf5559184620301ab45c24ddfa1ba03d26d60dab6accf7d99aef65a01698db71cb97b6ec054d20b31a0518440f4664b393b3cb799
-
SSDEEP
3072:PxFEOrmKMFDjwfBIJgYfU09LcTJjp6rVY9Q:5FEOrmKks5GgQ94yVJ
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/2308-1-0x000001FEFEBD0000-0x000001FEFEBF2000-memory.dmp family_strela behavioral2/memory/2308-0-0x000001FEFEBD0000-0x000001FEFEBF2000-memory.dmp family_strela