Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8e1602d6f2580164904b3f33474d253e7d552f6709940911dad746dbcf52d71d.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
8e1602d6f2580164904b3f33474d253e7d552f6709940911dad746dbcf52d71d.dll
-
Size
124KB
-
MD5
f91f66e81732f93f3c685f065e18323d
-
SHA1
9d47d1a2baa421588a132bd4fd51e0b45d38e1be
-
SHA256
8e1602d6f2580164904b3f33474d253e7d552f6709940911dad746dbcf52d71d
-
SHA512
5f71978ce0996ca1998ac43d34d71bf2e33e10b83da3d6ca7d1b906da5f42355f4a4eb827f4541e476427f137bb045e9513018757de9e1600c1888554be75dea
-
SSDEEP
3072:Wb5APZYhhjCvLb7yJ0An1cdwdlOFd4SE:oLCvDi0WLlOFd4N
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3464-0-0x0000022A87460000-0x0000022A87482000-memory.dmp family_strela behavioral1/memory/3464-1-0x0000022A87460000-0x0000022A87482000-memory.dmp family_strela