Analysis
-
max time kernel
116s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 21:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e1d4e08f5b9c13697b73d129e613e70N.dll
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
0e1d4e08f5b9c13697b73d129e613e70N.dll
-
Size
124KB
-
MD5
0e1d4e08f5b9c13697b73d129e613e70
-
SHA1
6a99829ea50070738f327c553e3cdc582563a64c
-
SHA256
25b76fa5ce715d9ee59c8fd8ca1b471925b80370aa9997447b7a3aa71066fd27
-
SHA512
eac479381f8c5d6694cbaa6a4ac1ddee5eac89400be488b32e848f39bdeab1b3cde0d6821fd09a228c26fff9c9d96ccafb63e59f2b1299013284d804507454c2
-
SSDEEP
3072:VcHVd9qKJdWmqTWg/UeFXi+LGYDBS4t2HLAuXHCf:OHOTW8XiMRlSlrAwH
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/3064-0-0x00000251B7AB0000-0x00000251B7AD2000-memory.dmp family_strela behavioral2/memory/3064-1-0x00000251B7AB0000-0x00000251B7AD2000-memory.dmp family_strela