General
-
Target
2400-0-0x0000000000190000-0x00000000001B2000-memory.dmp
-
Size
136KB
-
MD5
ceea3a0ece3eaa7977ba0bb738c7155b
-
SHA1
f2452f95b0c2d21211ebe02443a15435cb0b508a
-
SHA256
f2c32943d42d55960b8c5266562da586437ebe93536a9cae849a1bafc318c324
-
SHA512
b83c6281e5543b3853ea2083ae37c66704defd7eeb647cddbdb836db1e35e19d06abf3e13a16549a58d6f04b3f9a78d785fe16d51d91a99339d1a1d6909b841e
-
SSDEEP
3072:ApN0tKx94s/dhRtks/+Lrv8+kvSNDlLa2+u+j:YWKx9j/dhcm+3vhD22N+j
Score
10/10
Malware Config
Extracted
Family
strela
C2
45.9.74.36
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule sample family_strela -
Strela family
Files
-
2400-0-0x0000000000190000-0x00000000001B2000-memory.dmp