General
-
Target
2528-0-0x0000000000420000-0x0000000000443000-memory.dmp
-
Size
140KB
-
MD5
74ef6c876a3c39e98a9b959c4a840dd0
-
SHA1
aa68ce088ca96461e8ecf56281f7f301cc1b1ff8
-
SHA256
ef55776d0da4c28ca14227a8af6e64e92426d8a94364ec7a823242a82bf2d7cc
-
SHA512
d3771619b8bcd0d5b304c92719c30c0a7504b076c52d5e65b2eb746bbba2d19b69f80674820d07ebb17c055c67892c93db4ea70b7d695278b0bd32c8a5f69057
-
SSDEEP
3072:n1B7Url+tJ2Um6bpRkN4JpuDw5UgILSBO2of10:nTq+tJ2UTbpHJpOiw9m
Score
10/10
Malware Config
Extracted
Family
strela
C2
94.159.113.48
Attributes
-
url_path
/server.php
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule sample family_strela -
Strela family
Files
-
2528-0-0x0000000000420000-0x0000000000443000-memory.dmp