Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a8674670a6656eb2329f822fbbccc95f75097ad0ebf9d58057a5467e9ef1f0af.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
a8674670a6656eb2329f822fbbccc95f75097ad0ebf9d58057a5467e9ef1f0af.dll
-
Size
124KB
-
MD5
74df35609cea5553825be9863cd17987
-
SHA1
d1321b6e48b7135cb555b16152ae4df2f81f1bfc
-
SHA256
a8674670a6656eb2329f822fbbccc95f75097ad0ebf9d58057a5467e9ef1f0af
-
SHA512
0b55de94f50939293499e6ecec003237e4637c158da1fd91fa4a44e66d6639c1a78e2e8b026eabc8b31f1d26626a614ce1f1c770f87298868ac2fba12a7591a4
-
SSDEEP
3072:Lgov+qhBziVOXR9/SbUatr0tSDOvsX32Pb:LP2E0Vg7GU8A8DOvsHq
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/4692-0-0x00000275C89F0000-0x00000275C8A12000-memory.dmp family_strela behavioral1/memory/4692-1-0x00000275C89F0000-0x00000275C8A12000-memory.dmp family_strela