Analysis
-
max time kernel
100s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 05:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7890e39bc2b73d815c4e39d0f3c333c0N.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
7890e39bc2b73d815c4e39d0f3c333c0N.dll
-
Size
124KB
-
MD5
7890e39bc2b73d815c4e39d0f3c333c0
-
SHA1
1218fdb65191e76cf24206cf015ac6c41b87c5d8
-
SHA256
4c8c3d52173b4aa9379831ca31c4b30fb66fd2588c94a431f64defa6ef07eda4
-
SHA512
e4c3f3f45cbe080c8899dae86df5f1ae7f2e7795155e6dcb857302718662694ec1d4cf60927fec31e3ce5270ca9380d5fd96e0250f0222be9de261b236c3c133
-
SSDEEP
3072:/hsORMGfuHYDTqrBvvfTohCSTxumv+D2UTWCZfQVZw8:JFRjf5DTKF3TohCyvM6Cs
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/3840-0-0x000001C02E590000-0x000001C02E5B2000-memory.dmp family_strela behavioral2/memory/3840-1-0x000001C02E590000-0x000001C02E5B2000-memory.dmp family_strela