Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 12:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1c2bb3007ced7dca5192273493e7a5550efa9740c374cda16a10ef626646f934.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
1c2bb3007ced7dca5192273493e7a5550efa9740c374cda16a10ef626646f934.dll
-
Size
125KB
-
MD5
2dbc412aa734fec7e9df08cbe10c138f
-
SHA1
0af0fcc580f812e1b2f06b5bcd6a18956d18d2de
-
SHA256
1c2bb3007ced7dca5192273493e7a5550efa9740c374cda16a10ef626646f934
-
SHA512
922caed4c1503dc189aeee82bf5125e7d2ee12c619268f2255d38a02ddb8a42c6b537f610253923b0b7886aae13a2ad5554791b629643a0248b4124a0051e4a7
-
SSDEEP
3072:wEnwqWeikO0XjorWOQMMf2owKM3d00rZGJ0+m9RBVqa:wEnpWpiXk6OQMM+DKO+gZ+TsRB
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/5092-0-0x0000024D75AF0000-0x0000024D75B12000-memory.dmp family_strela behavioral1/memory/5092-1-0x0000024D75AF0000-0x0000024D75B12000-memory.dmp family_strela