Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 08:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9490ed3673ef571816040d923f51be20N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
9490ed3673ef571816040d923f51be20N.dll
-
Size
125KB
-
MD5
9490ed3673ef571816040d923f51be20
-
SHA1
d79d0a274943d82066ba2c36f3d8f176be89d8da
-
SHA256
a49c69bb42d3e21102275db54f60e6bdbaf5ecb8bd477e680863c9fb8ba7e435
-
SHA512
d972a3c4b0ee975fab46944a56215693580b8144d0017d13e89398a832ccedc4ee1c396a7dbcf3a82165ecf9b94ece04a7700b4bff70fb57728ad45e2789edec
-
SSDEEP
3072:ATS6drATtAtERpku/TAESKN2tX1M0v/jhJsMsdW:AGW6tAtERTHSoK1Zv/jps8
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/3476-0-0x000001D883870000-0x000001D883892000-memory.dmp family_strela behavioral2/memory/3476-1-0x000001D883870000-0x000001D883892000-memory.dmp family_strela