Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 00:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3359c83d024d2c030cc4c8ba3dd487b0N.dll
Resource
win7-20240708-en
2 signatures
120 seconds
General
-
Target
3359c83d024d2c030cc4c8ba3dd487b0N.dll
-
Size
123KB
-
MD5
3359c83d024d2c030cc4c8ba3dd487b0
-
SHA1
20b1d2477fe16010788f2a7662f4717c78743f01
-
SHA256
01e7e743740b49e72150c176892794c2f7661768fec6169f98a404b924e242c4
-
SHA512
88d47ea5504e4b80a4edf30af54f419e940a582f4c02dffb004139ab5ce5d9afcb363c580e5e353fc9e77fc2c52441c74f43ef0d59d3c5c39f23f851bc4773fb
-
SSDEEP
3072:4m2W4HyYFNy3usAXVuLbMnm62bD4hJYJIegHCRbs9gO7h7:xSz2upFusm6I4h+JIeICRbs917h7
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4412-0-0x000001D8E1450000-0x000001D8E1472000-memory.dmp family_strela behavioral2/memory/4412-1-0x000001D8E1450000-0x000001D8E1472000-memory.dmp family_strela