Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 11:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e649bcfd6e1bb147cde22ef1e2d5b4d7c7d07b91aada41e56a1f7ad6425285ca.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e649bcfd6e1bb147cde22ef1e2d5b4d7c7d07b91aada41e56a1f7ad6425285ca.dll
-
Size
124KB
-
MD5
e8a6266311832cc6441bbb98bfe21692
-
SHA1
038ec21762087501876a28f131506d4a5634de1a
-
SHA256
e649bcfd6e1bb147cde22ef1e2d5b4d7c7d07b91aada41e56a1f7ad6425285ca
-
SHA512
6fff8348608391d8abfd9e4c41c6c031e84f77becb2b93cb3a24ef52236392620f6d61355a6bb1438eb7bcbfb95b5dd086efb841555879aae2bf671232ce64eb
-
SSDEEP
3072:qzeo0p6Nmh1nKGbGONIVevaEM7/xTGP1JIWmU0:0i6GnKqIciEM7FGP1GU0
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1708-0-0x000001F5CB380000-0x000001F5CB3A2000-memory.dmp family_strela behavioral1/memory/1708-1-0x000001F5CB380000-0x000001F5CB3A2000-memory.dmp family_strela