Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 03:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
587a28c6bd0063a7b48f2c6a8b060050N.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
587a28c6bd0063a7b48f2c6a8b060050N.dll
-
Size
122KB
-
MD5
587a28c6bd0063a7b48f2c6a8b060050
-
SHA1
17a8cf60287a5a1532978e98a61e3d90705c7a6e
-
SHA256
c16c3e2c433d8eab544a9d1c4b5573365ac205e9a2c818baeab7b2b2b993ea25
-
SHA512
79351f96c74564b4b2944c913b4fb7140179066723e02ef592b8a9f7fdcecc4fad6bcb8493729ee47c89080e70f3a94aee73329dd823c9490626c81ae39c9578
-
SSDEEP
3072:nc+txrkwtvgkYNw2ujfBzCtOs8VRTLd5eLcVpKbbJkwl:ncIhgkYNwhZCtqcpblkwl
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/3544-0-0x00000239C74C0000-0x00000239C74E2000-memory.dmp family_strela behavioral2/memory/3544-1-0x00000239C74C0000-0x00000239C74E2000-memory.dmp family_strela