Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 11:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
48f86ee48dac61f7b6378f35271df84b34774d045edce961cf31709913992e2a.dll
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
48f86ee48dac61f7b6378f35271df84b34774d045edce961cf31709913992e2a.dll
-
Size
124KB
-
MD5
2352ad7cf138d553b9a99f2dd4348ac8
-
SHA1
cd4a6ce23f264549dddddf2482ea059ed9fd82c8
-
SHA256
48f86ee48dac61f7b6378f35271df84b34774d045edce961cf31709913992e2a
-
SHA512
e30b571683d80922b5b5e1a13e78df1c791543bcc74d901b04d167559617b25b839ad0aba45385cc56ec831c128a6232240768bcd0cb0182fc623c9a05a131fd
-
SSDEEP
3072:AoqyaWw6TBzKPbiP/hJBa7cMO+r8ftbbSoN82a6gnM:uya36VKPbifOcMSftbbjN8M
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/5012-0-0x000002783A280000-0x000002783A2A2000-memory.dmp family_strela behavioral1/memory/5012-1-0x000002783A280000-0x000002783A2A2000-memory.dmp family_strela