Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 15:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
__8E3C3DD5-336E-4B8E-BBA3-A798F1154CE6_.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
60 seconds
General
-
Target
__8E3C3DD5-336E-4B8E-BBA3-A798F1154CE6_.dll
-
Size
140KB
-
MD5
654117d70d1dfbfa4c4cb322ffcd0da1
-
SHA1
f6a14cd76cf15d3c0713532d291799a420d14208
-
SHA256
7942f25cfd89477e50bd5ee39706bae8473e3c5d63642f5c58a80c361742edd1
-
SHA512
85df87d6948661d4be7a49d94be18237d2cb80e001292cd2b5244bb7dade5171fd1dfb9010e6d84c23383ad9c07315f5b3a8bf0a27991e401ae139ef5da16b2f
-
SSDEEP
3072:BMurSpD8Jnyc4QZ1MutrzXrZKFZGi4XXOxf6lBLkLMx:BMCkD8EbIzYMXX4fsH
Malware Config
Extracted
Family
strela
C2
94.159.113.79
Attributes
-
url_path
/up.php
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/2036-1-0x00000000022B0000-0x00000000022D3000-memory.dmp family_strela behavioral2/memory/2036-2-0x00000000022B0000-0x00000000022D3000-memory.dmp family_strela -
Strela family