Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e31665a14b718aed05d7ade0c1f49a2a7544891e85ff7ce915d3f3306736034b.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
e31665a14b718aed05d7ade0c1f49a2a7544891e85ff7ce915d3f3306736034b.dll
-
Size
124KB
-
MD5
86e6ca2cd59546599f1fbf5d0b706faf
-
SHA1
a55e6693a80a73084885b4d5df14c3b6773b6c04
-
SHA256
e31665a14b718aed05d7ade0c1f49a2a7544891e85ff7ce915d3f3306736034b
-
SHA512
fa0949efdf677259f09af2de831f36a0ab2e4983da7e06b181ff9a21cd82c60cb5dc56ab95bb86b9b67b80dcd1c33f62fb2fe21be6f9331aa9c026953be9604b
-
SSDEEP
3072:D0GypD5EjkxU7bXeAIr/XOHRLDCxe+58lJu:pypFOk2XXkPmRGMHDu
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/4824-0-0x000001FCCDD20000-0x000001FCCDD42000-memory.dmp family_strela behavioral1/memory/4824-1-0x000001FCCDD20000-0x000001FCCDD42000-memory.dmp family_strela