Analysis
-
max time kernel
92s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 13:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c416011f5d516140c948bbd83b12e440N.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
120 seconds
General
-
Target
c416011f5d516140c948bbd83b12e440N.dll
-
Size
123KB
-
MD5
c416011f5d516140c948bbd83b12e440
-
SHA1
f831d54959f01f193cb0785a1f6d4a11465ca3ea
-
SHA256
3ed9e3eed6ec0bc61a05fc4c9763878b55a0b6cdeb661ab1588772bf9658409c
-
SHA512
bcc68c92a7ceb6ccff96dcf0c32f933253d87f4555e07ee3caa2362896fe29d053682b0c18083a1314671eafa7c9bab8531a4709c9bb0223b79903e579e6139e
-
SSDEEP
3072:pBw4mlftchL4h8wKjF+BTMVxbDk8F5i1EY:7w9zch0+Bbv5Xi1E
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/2660-0-0x000002C2C1E40000-0x000002C2C1E62000-memory.dmp family_strela behavioral2/memory/2660-1-0x000002C2C1E40000-0x000002C2C1E62000-memory.dmp family_strela