Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 08:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7562e0c3e5fb3fa50c50a132e457f150N.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
7562e0c3e5fb3fa50c50a132e457f150N.dll
-
Size
161KB
-
MD5
7562e0c3e5fb3fa50c50a132e457f150
-
SHA1
3353658e7139877a6932edd7398c252fe89728f3
-
SHA256
7d4d02acad5ade50cd1cc8c8ac532d13e7b98b1be5f61faca95b8193ca4de1a3
-
SHA512
7c7e23204ae8158924c720e3eea9873e018c6724bcbe573c0fbc8c32758ed3e14577dd804bf2f4e3eff34efdadb872936dd2cac42dc7ded2d66750f34ec2df81
-
SSDEEP
3072:tv4a39D0jzFHjk/SKvEuU9H4mNQDTh8yJd7p9qhH2pN81d2Zq:qa3l01DkKwQH4mNQDPJR2W80
Malware Config
Extracted
Family
strela
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4616-0-0x0000000002170000-0x0000000002192000-memory.dmp family_strela behavioral2/memory/4616-1-0x0000000002170000-0x0000000002192000-memory.dmp family_strela