Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 00:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3941256ae9ae36b3bc4ce7b5c0d1fe60N.dll
Resource
win7-20240705-en
2 signatures
120 seconds
General
-
Target
3941256ae9ae36b3bc4ce7b5c0d1fe60N.dll
-
Size
124KB
-
MD5
3941256ae9ae36b3bc4ce7b5c0d1fe60
-
SHA1
5c41dd5f26db545ecb73fce973684764d64518b6
-
SHA256
a2240d2626e83d08ea3b861c8df960308b5ce1dfb3dc108ba9a1e4ba686ebc2d
-
SHA512
76ea5d5252f246987560ba7a20bf37de776076c6f500e067e3cded1e03507c79dd38efe89343340c5df525a99a8f7e1ed7540bc10c6daf03f8bde0a9f69f4087
-
SSDEEP
1536:4paZ4kOXOAH7ND7Est//+DKD4/YdmmwiyosE1NgsOn7ttlIA+4nb/Up0GZTl5m:4sZ4rt5DN34/YXwG1NQtoAB/E0Gl
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4228-0-0x000001C909000000-0x000001C909022000-memory.dmp family_strela behavioral2/memory/4228-1-0x000001C909000000-0x000001C909022000-memory.dmp family_strela