Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 05:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ec54302fa9d93f8ade25832f7bfb8c22b665d971f4287c9c5465c7c288f056aa.dll
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
ec54302fa9d93f8ade25832f7bfb8c22b665d971f4287c9c5465c7c288f056aa.dll
-
Size
147KB
-
MD5
d215572a3879d40b815e99b5a311fc03
-
SHA1
74ff0e07879e690e4eae5e38f7085c7a3aba3e4c
-
SHA256
ec54302fa9d93f8ade25832f7bfb8c22b665d971f4287c9c5465c7c288f056aa
-
SHA512
0462cc75a7042c51df4e63980ebb69b1328a9a62ff39875ba1c2ad9b155d2b73db8e8586cce8f8770fb7f1ce2363fc27d1db8b53edde53aeeef4900fdd8d15f0
-
SSDEEP
3072:ptNVraccu1jqnl8r0Hlq+rLRFG5Q6YWeJtB8GQWfMl6JOx:fraICl84HlJfHG5Q6YVBzQ3kJ
Malware Config
Extracted
Family
strela
C2
94.159.113.79
Attributes
-
url_path
/up.php
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1500-0-0x00000000003C0000-0x00000000003E3000-memory.dmp family_strela behavioral1/memory/1500-1-0x00000000003C0000-0x00000000003E3000-memory.dmp family_strela -
Strela family