Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2936dc269353aa91e2165d074607b8cd8484bfb2ac3999409cd5c07c883dc344.dll
Resource
win10v2004-20240704-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2936dc269353aa91e2165d074607b8cd8484bfb2ac3999409cd5c07c883dc344.dll
-
Size
124KB
-
MD5
cc5efa312c5bfa48478d23ce520f2a00
-
SHA1
82d51aa98b7079df7d8759b3c5079cf82057cb21
-
SHA256
2936dc269353aa91e2165d074607b8cd8484bfb2ac3999409cd5c07c883dc344
-
SHA512
3ad35c297e91e9267d1c3a96060a14c85f8273cc58b45c703d7cf745d38dafbb2b35f71a87435615da14b2a3a9e8ce42862de2fa39d657fcb8860ae74df5f6f5
-
SSDEEP
3072:0ufRCyFHQDCWdvLAIkdkzLdW1ANfGp1s/4UaVNT:RRLFHOv0IkdkXEej4UaL
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1968-0-0x0000020498350000-0x0000020498372000-memory.dmp family_strela behavioral1/memory/1968-1-0x0000020498350000-0x0000020498372000-memory.dmp family_strela