Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 10:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
abe13f283dadba56707fb4de4a1e4f10N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
abe13f283dadba56707fb4de4a1e4f10N.dll
-
Size
122KB
-
MD5
abe13f283dadba56707fb4de4a1e4f10
-
SHA1
f2508496a69c0e8d01cd1cd3ee0464b4a0e7bca8
-
SHA256
7b57d1ae738c129bae1913aabd8f5fa37bfade2bb6a7bf90d93406a7785f5b1f
-
SHA512
67bfa13500d9021f22e1dd4a3a6556957db534aabbd9700f8faa2b7240f3a9f18414ab59e43b431a5629a5aec71c575c3f35d6671ef20e258a915101546d2693
-
SSDEEP
3072:YGx6TEQBAq4cC5rETi/lQb1x6DLO2FFHoM2bRzqVV0TSoC34q2A08:YQ6YQBAyUlQbn6GIFHorb9qhoCzdD
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4484-0-0x00000209C45C0000-0x00000209C45E2000-memory.dmp family_strela behavioral2/memory/4484-1-0x00000209C45C0000-0x00000209C45E2000-memory.dmp family_strela