General
-
Target
2360-0-0x00000000002D0000-0x00000000002F2000-memory.dmp
-
Size
136KB
-
MD5
18bacb06c517811b54addd38242561b3
-
SHA1
d664a95bc099b11358b2c6d62bbfd7772b94d29c
-
SHA256
b5f87156d9b9999591a9e3b039166a61d55e07c37b67eecdcfff5f748c9a979b
-
SHA512
0eba11ea213b1a347c1176d95e9dc4473f8b04a5f11acf5775cc5bf8edf022554119c8dfdaccaa3adf7a763feacb06b3b1efae4eea951fdbc862a4d1509f736c
-
SSDEEP
3072:yB7hrRdArDw3RRQ0Dnnmvxicq5kj9tYt+:yvrRdArDw30SnnmvUi6
Score
10/10
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule sample family_strela -
Strela family
Files
-
2360-0-0x00000000002D0000-0x00000000002F2000-memory.dmp