Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 02:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5407f452df5d24517d7d2e3d97334770N.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
5407f452df5d24517d7d2e3d97334770N.dll
-
Size
124KB
-
MD5
5407f452df5d24517d7d2e3d97334770
-
SHA1
40800a452366b2c521c2e7ebaf76036b29b9c7de
-
SHA256
a23de4531a16a1af7c71d7b36755605e01f1b35930a94ec32570fdfea2fab1f1
-
SHA512
eb33dd103de0066ed4ad4d3a6cdcadae801234f837ca0cef1016266dc2555b6a394e450ab67310e59ab10d4bdda9d97fb845dbfb12a35039e48284f66bb5fc4f
-
SSDEEP
3072:gQuPc0KGyDFao+H+O6sFrzuK1x1jooVMakj6QeN:GUvdDMf++raaxF7aC
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/1820-0-0x000001B6DBED0000-0x000001B6DBEF2000-memory.dmp family_strela behavioral2/memory/1820-1-0x000001B6DBED0000-0x000001B6DBEF2000-memory.dmp family_strela