Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 14:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4N.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
120 seconds
General
-
Target
466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4N.dll
-
Size
562KB
-
MD5
9c9cfdcf546f5408e8f969cd47c28140
-
SHA1
3d22f892b8eb0d6ce181f91c1d8a7bdc4a2c0622
-
SHA256
466fc5be6f5ca4e2d2433cd2848dcfe881f6db26294ce3d5c65d64bf724085f4
-
SHA512
cd7e4f0e0c4642769140e655e56ceaa81cc23483119de187079155324bdbfa007a0ce5fafed3188e0582b2a2f2e995533d1dea941e7c9ef5f76c457b1a0d495b
-
SSDEEP
12288:VIdFIRWYIUJd2sjBFit4vulDNCr+ckscRCnOsIqHUqQ:fWYIqd2sjLu5R2++kszUq
Malware Config
Extracted
Family
strela
C2
94.159.113.86
Attributes
-
url_path
/server.php
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/760-1-0x0000026F1A720000-0x0000026F1A743000-memory.dmp family_strela behavioral2/memory/760-3-0x0000026F1A720000-0x0000026F1A743000-memory.dmp family_strela -
Strela family