Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c7209a8f90434e24d15ed116ac7815a1643dafab7ce3f881050db25982f8d87e.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
c7209a8f90434e24d15ed116ac7815a1643dafab7ce3f881050db25982f8d87e.dll
-
Size
135KB
-
MD5
a341ebb0f6875e5e4de6cbe20b4eddec
-
SHA1
e6939cd45ad707c7c872cb3fad375680f0912f92
-
SHA256
c7209a8f90434e24d15ed116ac7815a1643dafab7ce3f881050db25982f8d87e
-
SHA512
e26cf8a68bfa9c2e43f0222e2f6ccf0944160ffab4c604e8cbcb5fb55a2128cbd9b1e1e89b6e76c6b28cb99d48ac7b3a03f7675e6b296d48435136c204482fc3
-
SSDEEP
3072:XXaahBOY5NCZr5Iot//MfPVLmES4KtTc5UtjcsQYRh4QpsW09gne:XqaPHEZraoNMfPVyEfKZc5U2s3hJc
Malware Config
Extracted
Family
strela
C2
94.159.113.79
Attributes
-
url_path
/up.php
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/384-1-0x0000000000640000-0x0000000000663000-memory.dmp family_strela behavioral2/memory/384-2-0x0000000000640000-0x0000000000663000-memory.dmp family_strela -
Strela family