Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c5c72a34adc7b7561f406dbb7fc13d481dd7e91447eb393ba723b53ef1ec4f4.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2c5c72a34adc7b7561f406dbb7fc13d481dd7e91447eb393ba723b53ef1ec4f4.dll
-
Size
123KB
-
MD5
f0a311d45093c348df29b5818f1d0807
-
SHA1
23aa7f26c428248b699cd0329fbe2d214eca2811
-
SHA256
2c5c72a34adc7b7561f406dbb7fc13d481dd7e91447eb393ba723b53ef1ec4f4
-
SHA512
348ce8c34f6d12c286259bd9846cff57a941742f73cb0082fd503173ad390e18d05118ca9faf6e81b132c56704238467662c8c1c412c3a2a285fc20437e84f5d
-
SSDEEP
3072:BSbEB14cmIYhczJ4xgwv6guasVn+2uGCZsZYU:BSoD47jSGan7uFwT
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3136-0-0x0000022A2FD40000-0x0000022A2FD62000-memory.dmp family_strela behavioral1/memory/3136-1-0x0000022A2FD40000-0x0000022A2FD62000-memory.dmp family_strela