General
-
Target
2720-0-0x0000000000150000-0x0000000000173000-memory.dmp
-
Size
140KB
-
MD5
0476d55eca83c76d5906613bcbeeb842
-
SHA1
c6b47ae86819e7c4306ba3c97137647a1f94d38f
-
SHA256
7d50f90135b11e80221041162cacd278bc52df89e8d98a6b14991a06b1e983da
-
SHA512
78a5b3157b285d2306a4e2d9ab4fbe74cd529bcbdb6cbdb9e938a7d4e958aaaf806b43304c4224523646be860093a5193a75ec9c1c47e9cb4e9e502720fdf487
-
SSDEEP
3072:vuJn7im/wK3eK0Rwq8T7NkYuetqqnqnWpt:Q2m/wK3eK0KT7N9urW3
Score
10/10
Malware Config
Extracted
Family
strela
C2
94.159.113.79
Attributes
-
url_path
/up.php
Signatures
-
Detects Strela Stealer payload 1 IoCs
Processes:
resource yara_rule sample family_strela -
Strela family
Files
-
2720-0-0x0000000000150000-0x0000000000173000-memory.dmp