Analysis
-
max time kernel
93s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 11:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0008a2ada86939d1ba920487625eb7ddea550957c3538149c6489d2d77392324.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
0008a2ada86939d1ba920487625eb7ddea550957c3538149c6489d2d77392324.dll
-
Size
122KB
-
MD5
7633c8ef918f13a51e74c9a8f9b09637
-
SHA1
5af00bf716e84c9a272a2cbb80782492cbcd0518
-
SHA256
0008a2ada86939d1ba920487625eb7ddea550957c3538149c6489d2d77392324
-
SHA512
a7ed2c6e4328e70ef35dc96032f3817c8f5f3d59c47c80a78044d234531a78efe111a42ef7a39ac57188926e0501f9b5f750f1ea2044d68fd8552946c1a6dd84
-
SSDEEP
3072:Zj2uaR5PytBloh5mWMn8x5gwiyGz/Q59F:Z1aH+DobmWMXw9F
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1212-0-0x0000015F93C80000-0x0000015F93CA2000-memory.dmp family_strela behavioral1/memory/1212-1-0x0000015F93C80000-0x0000015F93CA2000-memory.dmp family_strela