Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 03:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
644182a976bae08b631b405c61c14fa0N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
644182a976bae08b631b405c61c14fa0N.dll
-
Size
123KB
-
MD5
644182a976bae08b631b405c61c14fa0
-
SHA1
4a65166718e13dd3119b78b89148973c16104034
-
SHA256
0d29855a90fc846ef48e43f6767634131ba3bcaa17589b45cf49099385ce5ad8
-
SHA512
1b01f67dffea148ae787d77b5519027f3bff82f0c9e1f95c7deedb968c3e31f534d594c0c3508a75aaa88528fc3f35363a8da9b6eb0737c5f5ab23fd4d03eca9
-
SSDEEP
3072:QRc9I4M5Oe1TYLnrhXfNmxIItRIt+8f1:QRcSjf10nNPNzL+8f
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4840-0-0x000001C9CD690000-0x000001C9CD6B2000-memory.dmp family_strela behavioral2/memory/4840-1-0x000001C9CD690000-0x000001C9CD6B2000-memory.dmp family_strela