Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 12:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
285e78351be0b6cc411971b2edb48978cda68d369665b544a110960c03a86f8f.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
285e78351be0b6cc411971b2edb48978cda68d369665b544a110960c03a86f8f.dll
-
Size
124KB
-
MD5
2e3d913b4b885341f24bd4b1ab01a306
-
SHA1
abee5eb4e53b784f746da82efb974497ea4f3297
-
SHA256
285e78351be0b6cc411971b2edb48978cda68d369665b544a110960c03a86f8f
-
SHA512
1a8e6ed8bc97b7a98eb01b77383e612516b158a7db1342fdb7e7e4c9072d2483e7ceaf8db33cecf3bcb2948656db9df82e487d36ba4953dfe4f860b7307f0209
-
SSDEEP
3072:GVD705tDfA4DAxoYJHz1V7DwezHrd5EZ+:gU5tDYiYJr7D/r4+
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1696-0-0x000001CF430A0000-0x000001CF430C2000-memory.dmp family_strela behavioral1/memory/1696-1-0x000001CF430A0000-0x000001CF430C2000-memory.dmp family_strela