Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c51753eea5cb07b04212c4daa857a39dd28bb60c62125c160ab3aa6e4d77e0cd.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
c51753eea5cb07b04212c4daa857a39dd28bb60c62125c160ab3aa6e4d77e0cd.dll
-
Size
123KB
-
MD5
387e16b21b474dd35693e18ca9e88aaf
-
SHA1
32cd6b84a958f76427b8f2fd1418ecbdfcbb4ede
-
SHA256
c51753eea5cb07b04212c4daa857a39dd28bb60c62125c160ab3aa6e4d77e0cd
-
SHA512
cfbdcc67580c0991879dc849876d8c139837e67504e0ff206239b52b83d86b12280b4f54cb54ddaec2df4ac528dfb07f53677310f830a8bca4237c8ab9edbc20
-
SSDEEP
3072:UbKnJupWn8c7QsE5otvc/etSJip0q0Id4OaGpf:qKIES0eWtSJMKcp
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2420-0-0x000001FC854C0000-0x000001FC854E2000-memory.dmp family_strela behavioral1/memory/2420-1-0x000001FC854C0000-0x000001FC854E2000-memory.dmp family_strela