Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 11:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e9049c869fbeb3f0fbfea1fa65de1e5363e0a1070d2b52b0fc7af5467e315e88.dll
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
e9049c869fbeb3f0fbfea1fa65de1e5363e0a1070d2b52b0fc7af5467e315e88.dll
-
Size
136KB
-
MD5
fae7ce1aef2d673ebdb627dfd9271cf3
-
SHA1
fffca2a8661a14e8677073596944938ad8b97dc6
-
SHA256
e9049c869fbeb3f0fbfea1fa65de1e5363e0a1070d2b52b0fc7af5467e315e88
-
SHA512
0e61d452a0efde934597213e303581fb54b7459ed3b9aac84ca67bdee625f9c07d616d8eca2dfa040d5aa4dd27a1dfbcd4a7a2613aabd5ea90d8cfb8c7ccc4eb
-
SSDEEP
3072:1C637rL6QG31SK33KTBHXG1pyFEhY35qPhvcjGbI1k3UzN:1+X1r3qVG1pyFE635WvG/yUz
Malware Config
Extracted
Family
strela
C2
94.159.113.79
Attributes
-
url_path
/up.php
Signatures
-
Detects Strela Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/804-1-0x00000000011D0000-0x00000000011F3000-memory.dmp family_strela behavioral2/memory/804-3-0x00000000011D0000-0x00000000011F3000-memory.dmp family_strela -
Strela family