Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ac58364c5e391fdeddd10f31b3cbd067e4b91a64fac6247aa46d10778be78b8b.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
ac58364c5e391fdeddd10f31b3cbd067e4b91a64fac6247aa46d10778be78b8b.dll
-
Size
124KB
-
MD5
23fe716ad48ed6fbf68a607e349ac658
-
SHA1
755e84d73ba486aec2eabde510f880eb47b3de0d
-
SHA256
ac58364c5e391fdeddd10f31b3cbd067e4b91a64fac6247aa46d10778be78b8b
-
SHA512
d21dfc816b986d11a079fa23d98e213ca0e6c65782d5d64bf06b62df41a56b6b891b622abb483b539c70cef65d2b5973e7437997df4e448f5ddc95b56a0b554b
-
SSDEEP
1536:FsQzm5h6pUVmdmrLO+GtvCaXIgYt3zlfaA6zo7YP6M+v/llHAoZcn2qVUY3HeRKK:YVmdmHO+GRFYB6z4z8YY7V+r
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/4168-0-0x00000230305F0000-0x0000023030612000-memory.dmp family_strela behavioral1/memory/4168-1-0x00000230305F0000-0x0000023030612000-memory.dmp family_strela