Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
39b63729959ba13e1ca3e2d2f266e44d0c1d99c2582f0d3a7d008a633ff7a2af.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
39b63729959ba13e1ca3e2d2f266e44d0c1d99c2582f0d3a7d008a633ff7a2af.dll
-
Size
126KB
-
MD5
13fbe979c41176caf6bfd9de5836c216
-
SHA1
edef586ce7969095464febb3f306ed02a00a5ed0
-
SHA256
39b63729959ba13e1ca3e2d2f266e44d0c1d99c2582f0d3a7d008a633ff7a2af
-
SHA512
04442799ec12e93b105fb84dfbc0ef0649b1cf453026803d79cb46eb666fbecf77eb79cc6800694ac58cadbd329e40821653de92005259c669e11e144aed33ab
-
SSDEEP
3072:zrhUgwdooSXwCzlOz0yosfXWrluwYX0phwsVpNRp:zrh/gUXr4z7HfCluwrJpd
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3048-0-0x00000261F34A0000-0x00000261F34C2000-memory.dmp family_strela behavioral1/memory/3048-1-0x00000261F34A0000-0x00000261F34C2000-memory.dmp family_strela