Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 11:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b0d50ea2c3d04c4b9aa5705ae1f09d10N.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
b0d50ea2c3d04c4b9aa5705ae1f09d10N.dll
-
Size
124KB
-
MD5
b0d50ea2c3d04c4b9aa5705ae1f09d10
-
SHA1
c11bbbab57d754d32fe50f043110d79df00f2726
-
SHA256
f263e0e9a29a9dc777c4c10eb7c773cf6b51f66632c6e59a28a6375386ff78ef
-
SHA512
d06f185a991ccab6f289a0c9b7f8ac60448b7e52e1642793071ee982b25a39a23c7fedcf2eb3d9c8640acb5e6c1ec2394977ff341998eab15239a030f7d649ce
-
SSDEEP
3072:m/xRDifbsKDHY6vZ6+NoT8oxyLR9SodhSy4rtU6FOhr9:m/XDkq6v9KIR95dxCOR
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4188-0-0x00000286480C0000-0x00000286480E2000-memory.dmp family_strela behavioral2/memory/4188-1-0x00000286480C0000-0x00000286480E2000-memory.dmp family_strela