Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 11:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c776e16d054683dfd5c6280c9d4009bbe95a9d2d3a4f7855690409d89dd23dfd.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
c776e16d054683dfd5c6280c9d4009bbe95a9d2d3a4f7855690409d89dd23dfd.dll
-
Size
124KB
-
MD5
e18282d20e14cd4984a939835f61e79e
-
SHA1
6c2dd4295f015f8560d122ff1d65b3b9a7557b3e
-
SHA256
c776e16d054683dfd5c6280c9d4009bbe95a9d2d3a4f7855690409d89dd23dfd
-
SHA512
088434571083b352a366b3ea31c3d0b1536aba925b6964e2b6471067f520e0a3d2fb4ba0c23d0c6bd0ba4e67100f8a20c0168a379976c23f733a9733489dddf7
-
SSDEEP
3072:srx2x0cKeRRyNbtrxJ1kQwjXLE5Z9mm2y1:srxElTRENiXuZQm1
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/5040-0-0x000002438AA10000-0x000002438AA32000-memory.dmp family_strela behavioral1/memory/5040-1-0x000002438AA10000-0x000002438AA32000-memory.dmp family_strela