Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d4693e87aee3b9fbc28f6c5f207d487e08814b16b69a7d6dfbcdbce77922cb6c.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
d4693e87aee3b9fbc28f6c5f207d487e08814b16b69a7d6dfbcdbce77922cb6c.dll
-
Size
125KB
-
MD5
227b14f90f872d74a1f6626f10eb4073
-
SHA1
5e45ea35add4b34915080ededf8d180f941e55ba
-
SHA256
d4693e87aee3b9fbc28f6c5f207d487e08814b16b69a7d6dfbcdbce77922cb6c
-
SHA512
6b123f2464975a738ad87d606bc05da9be8fee593079811d5921ce0989c7a42475031edbe0621c1758ac123d1a35ff90d22234741cafdcabc25945aface10a1f
-
SSDEEP
3072:DpfT3fy7ah/7yMHBi9SL3CN3cx1jU6hLL/A5kcEPDPwCzJh:DFT2aFBMSL3Cu8aL/AudXzj
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3992-0-0x00000273186A0000-0x00000273186C2000-memory.dmp family_strela behavioral1/memory/3992-1-0x00000273186A0000-0x00000273186C2000-memory.dmp family_strela