General

  • Target

    2528-0-0x0000000000420000-0x0000000000443000-memory.dmp

  • Size

    140KB

  • MD5

    74ef6c876a3c39e98a9b959c4a840dd0

  • SHA1

    aa68ce088ca96461e8ecf56281f7f301cc1b1ff8

  • SHA256

    ef55776d0da4c28ca14227a8af6e64e92426d8a94364ec7a823242a82bf2d7cc

  • SHA512

    d3771619b8bcd0d5b304c92719c30c0a7504b076c52d5e65b2eb746bbba2d19b69f80674820d07ebb17c055c67892c93db4ea70b7d695278b0bd32c8a5f69057

  • SSDEEP

    3072:n1B7Url+tJ2Um6bpRkN4JpuDw5UgILSBO2of10:nTq+tJ2UTbpHJpOiw9m

Score
10/10

Malware Config

Extracted

Family

strela

C2

94.159.113.48

Attributes
  • url_path

    /server.php

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family

Files

  • 2528-0-0x0000000000420000-0x0000000000443000-memory.dmp