Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
680e1a65970c0558692c837c166283e685704dfcd4614e34a48c2859700d8d33.dll
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
680e1a65970c0558692c837c166283e685704dfcd4614e34a48c2859700d8d33.dll
-
Size
124KB
-
MD5
a85e464e7e202f056b9de204a23fc2e4
-
SHA1
cb7acf4cbdfca1ab4db9ae00741344b6c99c1ded
-
SHA256
680e1a65970c0558692c837c166283e685704dfcd4614e34a48c2859700d8d33
-
SHA512
a4f05080f2b7f92c4c583aa7ba3ca93c39853b7dd630051c3a6b8d979fb236ff7c278c7770e5c6d835c497e1fe634e0676511b920dea211c30f5b8d855ba1fda
-
SSDEEP
3072:a9b5Z+wzthvLPpezHZEjTK2S0/ZnPHHANBUNx:6b5ZlL8zHZEZLxfA
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3572-0-0x000001E6E6BC0000-0x000001E6E6BE2000-memory.dmp family_strela behavioral1/memory/3572-1-0x000001E6E6BC0000-0x000001E6E6BE2000-memory.dmp family_strela