Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7957eacfd58a550316857a4e64051631d0b3c1d705950ab9806f4755bb21b7f1.dll
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
7957eacfd58a550316857a4e64051631d0b3c1d705950ab9806f4755bb21b7f1.dll
-
Size
123KB
-
MD5
bc5c4d2f66599645f527efe04c208d18
-
SHA1
202e504117dd8e5fe24312e9e04d59d3edc6ec39
-
SHA256
7957eacfd58a550316857a4e64051631d0b3c1d705950ab9806f4755bb21b7f1
-
SHA512
4c8f7779174ee0bf8e87d368d79cb2a61102003a738ab0d56a6a15b56ef492041b3117f515615a87a988fc687e98a9ef3594054a7c1c1db4f5765d93123de6b5
-
SSDEEP
3072:n5pMq8MLSnovLQ6yOi/tsZM7MEPrW/L0aS0jb:nfMJnIc6yOiKM7MEPrW/L0dI
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2656-0-0x0000020F6F3B0000-0x0000020F6F3D2000-memory.dmp family_strela behavioral1/memory/2656-1-0x0000020F6F3B0000-0x0000020F6F3D2000-memory.dmp family_strela