Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
022148679d9ed7dcb27301fcd785204e28704efd98e416ce2450fd52fdb0ac9c.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
022148679d9ed7dcb27301fcd785204e28704efd98e416ce2450fd52fdb0ac9c.dll
-
Size
123KB
-
MD5
43dd58d0003b7164b7ec7e6edd47c1f9
-
SHA1
7ba685804df7a2e618108181899ea3dec8d062f6
-
SHA256
022148679d9ed7dcb27301fcd785204e28704efd98e416ce2450fd52fdb0ac9c
-
SHA512
eda7748cceab213d8434fcd023e13895cf1209255161f8ad0915f3ff9f3d77223bf088109140d2232652617c76e58160d49eec12560f32dde5e7f433cd0ad7ba
-
SSDEEP
1536:GyoQfQ86ULMaUHz6nh8PcOK8yn9bzK4clFvkDyNuH9Ms31h7L0OyLxFhYm5uMCBY:GF3z0G6mPby9be/FvKTWidwjLfuMk
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3100-0-0x00000184A1A80000-0x00000184A1AA2000-memory.dmp family_strela behavioral1/memory/3100-1-0x00000184A1A80000-0x00000184A1AA2000-memory.dmp family_strela