Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 01:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45f369397f628280220c25a47ba21ef0N.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
45f369397f628280220c25a47ba21ef0N.dll
-
Size
124KB
-
MD5
45f369397f628280220c25a47ba21ef0
-
SHA1
98ed9182a42c852f0841ceaf300b5ef44fdde3cf
-
SHA256
daff35f1fc58a91c820eee6b2628a590626c53006590d8e8d48e7bced48b73ac
-
SHA512
cf08069769e166b3f7a7654a0218dfbc83130fad118fafbc5184f6cd026992db2fb00a71947862c66acc52e85c87640bcb562736758a0458d06f529771d0aded
-
SSDEEP
3072:Q6TOqiclBKyp0xtnH3MiwbB9qkVjwn89aZM4:Q6w0BKc0jnXXwbFp+K4M4
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4636-0-0x000002390E170000-0x000002390E192000-memory.dmp family_strela behavioral2/memory/4636-1-0x000002390E170000-0x000002390E192000-memory.dmp family_strela