Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 03:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6eae5da4986feb5b0a2072da19199180N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
6eae5da4986feb5b0a2072da19199180N.dll
-
Size
128KB
-
MD5
6eae5da4986feb5b0a2072da19199180
-
SHA1
be1d657bb8d1445b8e7ad3d2af5831322c6e091d
-
SHA256
55631a3bf8ab4443946e456931a045cd2677cae52c60ced11bd047f70cd60584
-
SHA512
22b3aa6338bf823bb39549f2b02eb1c7fe637cc6b7cc1844c7f2dab454ef657632a516e6df7be213a1037aa0d6a6e0b0f55668d889b16fcf6687397866322fdf
-
SSDEEP
3072:8TJ1MtmOB7/RaTrLGSapv9ahgY0hbrSD:8t1Mt7Za+jpv2Ahb
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4120-0-0x00000240CAAD0000-0x00000240CAAF2000-memory.dmp family_strela behavioral2/memory/4120-1-0x00000240CAAD0000-0x00000240CAAF2000-memory.dmp family_strela