Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 23:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
29617404e7dd2cc4bf508a26c7bf8260N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
29617404e7dd2cc4bf508a26c7bf8260N.dll
-
Size
124KB
-
MD5
29617404e7dd2cc4bf508a26c7bf8260
-
SHA1
1d7a59faf39e895b8d16d31166b6189dc5c3f094
-
SHA256
d658df46208550130a3abb7e9129c4e5b240a29e544f894e98548788c0acc7bc
-
SHA512
0335860da32959fd01d6eebdaf2c441498ca4a48a98c2f41796fbb1352fc045395a6019cc32524d7d64f989306e162a94368a5915d8529babd9aeebe5d74d679
-
SSDEEP
1536:DYp9qn4H2DxshJ+iEt5bTvcUyzWgWtw5q2WnX2nv1Q2QSkp5YJuS18EXBlrzQq:DIs4H2DJtZvQzuw0RX29hVAYJuSTxlX
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/5100-0-0x000001EECD490000-0x000001EECD4B2000-memory.dmp family_strela behavioral2/memory/5100-1-0x000001EECD490000-0x000001EECD4B2000-memory.dmp family_strela