Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 11:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
23d48c2811bf97950a1132e428467864efe17b64170c55c5f73476be9ff72eb3.dll
Resource
win10v2004-20240704-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
23d48c2811bf97950a1132e428467864efe17b64170c55c5f73476be9ff72eb3.dll
-
Size
124KB
-
MD5
f70fac502d0bca403621a475dcb1a938
-
SHA1
1caacd7e0f23fb99f62b1beddab4f7dac548c467
-
SHA256
23d48c2811bf97950a1132e428467864efe17b64170c55c5f73476be9ff72eb3
-
SHA512
de349788ccf3595825c7f853eae59cf3db028d83005809d99d248f715d520dae83594cedfdbb1ec593684c869bab48125c52877a2f7ccb52d4b127989d39fae0
-
SSDEEP
3072:Stxwok6uGjPFXg9y8x+aC2ojsmj9IIHmS81/Q6:Stxw17eZ8x1ojsmK
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1808-0-0x000001A6B0DB0000-0x000001A6B0DD2000-memory.dmp family_strela behavioral1/memory/1808-1-0x000001A6B0DB0000-0x000001A6B0DD2000-memory.dmp family_strela