Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 14:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ea6b5481b7aac8197f01165fd064bba0N.dll
Resource
win7-20240704-en
2 signatures
120 seconds
General
-
Target
ea6b5481b7aac8197f01165fd064bba0N.dll
-
Size
124KB
-
MD5
ea6b5481b7aac8197f01165fd064bba0
-
SHA1
6f33f8c5d2f384d31bd4fcda96c056a1151232bd
-
SHA256
0a690b97ed5ab6a548cec81f5a632c80fcedde6fc7f26d126363dc8924c969fe
-
SHA512
1741c4726cd6ad03a448221a32b9443f76bf91ad0ae4e189ebd53902aec2ac3a9a7f112694496b98d33c043761953aa3512cc4d950b58f56f95f263450d32a4a
-
SSDEEP
3072:2UxRet7AyQj0cx3zJOqCNVy9s6fCZ1U2nIR:uTcVzJO9nm
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/3640-0-0x000001EEA1F00000-0x000001EEA1F22000-memory.dmp family_strela behavioral2/memory/3640-1-0x000001EEA1F00000-0x000001EEA1F22000-memory.dmp family_strela