Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 14:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f50df05ae6238189b43ce1b1101f67c6.dll
Resource
win7-20241010-en
windows7-x64
2 signatures
150 seconds
General
-
Target
f50df05ae6238189b43ce1b1101f67c6.dll
-
Size
278KB
-
MD5
f50df05ae6238189b43ce1b1101f67c6
-
SHA1
eee86d826e9ee48ab5dd0c0965277d0868b9df89
-
SHA256
1970d38e7fa45a46e792372a19d890541c87d1007ddedd53858b6df6728d72ff
-
SHA512
817d64e87d12cf76497f5ee482707db24ac0fbe131598636992f7ec0efb240bd3c59079fc9366eae4e03f4e1ce39990b05945e54d580ae9ba1b0f79223d0681f
-
SSDEEP
6144:DMgNhY/LbOxL5HmXQ3w8rr984zwpzNjC7uJ4/VhTU:DtNQIL5Hmg3b6Ewz6U
Malware Config
Extracted
Family
strela
C2
94.159.113.48
Attributes
-
url_path
/server.php
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1980-0-0x0000000001DF0000-0x0000000001E13000-memory.dmp family_strela behavioral1/memory/1980-2-0x0000000001DF0000-0x0000000001E13000-memory.dmp family_strela