Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
581fe2ae1dd054d584093d440df3f36ec2e62fa9ff673796353b7342bba56d9a.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
581fe2ae1dd054d584093d440df3f36ec2e62fa9ff673796353b7342bba56d9a.dll
-
Size
123KB
-
MD5
6395685905c256888571c4eb93b8be6b
-
SHA1
b6a4939381edc2ecb90590e14b68d8e247347653
-
SHA256
581fe2ae1dd054d584093d440df3f36ec2e62fa9ff673796353b7342bba56d9a
-
SHA512
5cad30baf0d9853049fc55e876630ae7ac3c9b89564d4e5feb64427bd02d02a266f181b6a294068318493ee1d8d315fc3e08345becccf70a523f8f2d6792e311
-
SSDEEP
3072:GzLQqGP6VDIcbbFbJ4/hFGg6McmNTbzs3uNxsNIhItvQ:GUODzE/HG96Nbzsz
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3844-0-0x000002697B850000-0x000002697B872000-memory.dmp family_strela behavioral1/memory/3844-1-0x000002697B850000-0x000002697B872000-memory.dmp family_strela