Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-07-2024 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8197d02e30ad33bffaa6b095dec4a3a125aa1ca8c6934cf8e6027cf78d452d8a.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
8197d02e30ad33bffaa6b095dec4a3a125aa1ca8c6934cf8e6027cf78d452d8a.dll
-
Size
125KB
-
MD5
a5dac18e20e2c7060bbe3a95385b7b26
-
SHA1
1f19aaffca4e567fd945fc86d6ffd3c37977dd2b
-
SHA256
8197d02e30ad33bffaa6b095dec4a3a125aa1ca8c6934cf8e6027cf78d452d8a
-
SHA512
9c064a68842375e9d7210b04232875da35850228775d22a76068b4bf21a0760a321af4704991d4da322c4f33d46c21b6ea70b830d0bbd851fe233539c8bb1a48
-
SSDEEP
3072:/Dnt2V0OXe1qj/wIdhsSerS4iiOobn4W2S:/0fF/0XrSRpU4i
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/3336-0-0x0000029C286D0000-0x0000029C286F2000-memory.dmp family_strela behavioral2/memory/3336-1-0x0000029C286D0000-0x0000029C286F2000-memory.dmp family_strela