Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 01:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
523b23099348f7d9fa6cc20fffb8e500N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
523b23099348f7d9fa6cc20fffb8e500N.dll
-
Size
211KB
-
MD5
523b23099348f7d9fa6cc20fffb8e500
-
SHA1
38bbcee0a0dba04c69b1d524742445aee614ddff
-
SHA256
a83fc9a9c54415e4494bbdaa5a41b880c9170c07252331f6242f379e29b901a2
-
SHA512
5a9e997bc7c649554df57f37e6efff04d27e85b88bc0e23da244e9295ba324c13c4e838bc7d7d3095b0386048f240f48a7afd56753afdd100c5cc37ddced95af
-
SSDEEP
6144:wg6t1PDwKD0PRqDA2DpWkwj8GG/ebt2cUB:wHbD0PRYA2DOrPUB
Malware Config
Extracted
Family
strela
C2
45.9.74.176
Attributes
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1948-1-0x000007FEFB940000-0x000007FEFB97C000-memory.dmp family_strela behavioral1/memory/1948-0-0x00000000003F0000-0x0000000000412000-memory.dmp family_strela