Analysis
-
max time kernel
21s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 15:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
__8E3C3DD5-336E-4B8E-BBA3-A798F1154CE6_.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
60 seconds
General
-
Target
__8E3C3DD5-336E-4B8E-BBA3-A798F1154CE6_.dll
-
Size
140KB
-
MD5
654117d70d1dfbfa4c4cb322ffcd0da1
-
SHA1
f6a14cd76cf15d3c0713532d291799a420d14208
-
SHA256
7942f25cfd89477e50bd5ee39706bae8473e3c5d63642f5c58a80c361742edd1
-
SHA512
85df87d6948661d4be7a49d94be18237d2cb80e001292cd2b5244bb7dade5171fd1dfb9010e6d84c23383ad9c07315f5b3a8bf0a27991e401ae139ef5da16b2f
-
SSDEEP
3072:BMurSpD8Jnyc4QZ1MutrzXrZKFZGi4XXOxf6lBLkLMx:BMCkD8EbIzYMXX4fsH
Malware Config
Extracted
Family
strela
C2
94.159.113.79
Attributes
-
url_path
/up.php
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2256-0-0x00000000001E0000-0x0000000000203000-memory.dmp family_strela behavioral1/memory/2256-1-0x00000000001E0000-0x0000000000203000-memory.dmp family_strela -
Strela family