Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 22:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
202febe577cc3f38e4edb00367edfeb0N.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
120 seconds
General
-
Target
202febe577cc3f38e4edb00367edfeb0N.dll
-
Size
280KB
-
MD5
202febe577cc3f38e4edb00367edfeb0
-
SHA1
8cc4532db11ee5083ddb90354b2591aa4c283fbb
-
SHA256
9083539da0cb9d9501558da5b5b66a7c5a935264fb3717220fdbcf26adb0b6e3
-
SHA512
23d5d50d7e15ea822e8e1f0f03a65de7bb27b80dbdce71dc5d1dcecb9dd567ba67ca9b31a0a96337d51b423cde373882871c6c338bf6eb03ab11286e7d6a5b9a
-
SSDEEP
6144:2grnHIJUCzuEh5xyJYgelEbUFdeFThQHaqBb03UB:2g2juHJYgYndeU6qpB
Malware Config
Extracted
Family
strela
C2
45.9.74.176
Attributes
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1904-1-0x0000000001EB0000-0x0000000001ED2000-memory.dmp family_strela behavioral1/memory/1904-0-0x000007FEF7470000-0x000007FEF74BD000-memory.dmp family_strela