Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 11:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
59b269e058844f50fca4f2109d19e1004dc1b29957007adb39d1663e3a733748.dll
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
59b269e058844f50fca4f2109d19e1004dc1b29957007adb39d1663e3a733748.dll
-
Size
124KB
-
MD5
690078628a893d2e225f39f0224c8de1
-
SHA1
68ab45bf5d596a41e7af5506877b314dbf02fe92
-
SHA256
59b269e058844f50fca4f2109d19e1004dc1b29957007adb39d1663e3a733748
-
SHA512
6103cf0ef16824a04b49e8ba5285c06f3ee749c0ac9f7014afdeda6401730598a60af8a9b19a8bb7de25cbd039eb5ec072189085ee01170b99eed799160bf66f
-
SSDEEP
3072:HgFY8w6Mti9x8ffKXNfA+IVptJXGr2ebU2WleidAcVY/1:Hf8wZme3K9fgVpTWr2evWu
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/4548-0-0x00000209252D0000-0x00000209252F2000-memory.dmp family_strela behavioral1/memory/4548-1-0x00000209252D0000-0x00000209252F2000-memory.dmp family_strela