General
-
Target
2860-0-0x00000000002D0000-0x00000000002F3000-memory.dmp
-
Size
140KB
-
MD5
db8404bdc505437cc3809ab7b4fbf2a3
-
SHA1
30065f9c0386587d2f59effb61b082e476bc9be7
-
SHA256
c8063d9c2cad116a2306f7cb2c7553ad37493397bf532ccfe5ad9da692af0275
-
SHA512
6ade39579332e549c9ea37845edee23687320538818079c1b69f327f96cec974d40a0dacaeb59f124690378615c5e0727c40365b2ccb4543213132ae09714590
-
SSDEEP
3072:vuJn7im/wK3eK0Rwq8T7NkYu2n1qqvqnhCt:Q2m/wK3eK0KT7N9ujhc
Score
10/10
Malware Config
Extracted
Family
strela
C2
94.159.113.79
Attributes
-
url_path
/up.php
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule sample family_strela -
Strela family
Files
-
2860-0-0x00000000002D0000-0x00000000002F3000-memory.dmp