Analysis
-
max time kernel
93s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 22:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1e070f48e7c6413c8eacd69d8f0d96d0N.dll
Resource
win7-20240704-en
2 signatures
120 seconds
General
-
Target
1e070f48e7c6413c8eacd69d8f0d96d0N.dll
-
Size
123KB
-
MD5
1e070f48e7c6413c8eacd69d8f0d96d0
-
SHA1
50d4dc89adcc735c1cd73055d8f4be1bf7832fa4
-
SHA256
5fa87e15e950192a91d7a28b39c53b5f15e3e553e8f2b0c5b72615578f07179e
-
SHA512
d5ea99fe1ca9b632f454fee970bb7f80bc697fed3273e91d6fa67c7a78a6e8de9adb6e7e091962cdec6f972868c5b3267a0d5f6b449d94a54a648253f5493184
-
SSDEEP
3072:8Y5fKu+TcMnx2iP9eZ8S8ZG/ucFmY1taT1uX3RaVm:p8JiPFmQkhi
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/1696-0-0x00000271D73B0000-0x00000271D73D2000-memory.dmp family_strela behavioral2/memory/1696-1-0x00000271D73B0000-0x00000271D73D2000-memory.dmp family_strela