Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e8f92d9b98e9e32ef9df7731d900089ba281bbc19d31280f1d5fbce6e523aad7.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e8f92d9b98e9e32ef9df7731d900089ba281bbc19d31280f1d5fbce6e523aad7.dll
-
Size
124KB
-
MD5
ee965094f35e8340e0e5c0861e90ea89
-
SHA1
914a52072fcaf5d62223759cf3946e11514da93e
-
SHA256
e8f92d9b98e9e32ef9df7731d900089ba281bbc19d31280f1d5fbce6e523aad7
-
SHA512
ec174e22e6fa7a2e52f6a91a016419b48b9a31bedc17e28eaeebdb37b6368da9cdae34995e787b71414678ab99c30713182969d17446529aea8fa7211150b928
-
SSDEEP
3072:tALETkTcKvi7d+hX/Zq5cxsWNnMXaGfArBrfv8:tA4IgKq7UZhqSxVnxgAdf0
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/5052-0-0x000001965D570000-0x000001965D592000-memory.dmp family_strela behavioral1/memory/5052-1-0x000001965D570000-0x000001965D592000-memory.dmp family_strela