Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 18:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5ae75b8397d89ad209984ca27603a954a2615bd677777fe5ff6a0d5a1164c39b.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
5ae75b8397d89ad209984ca27603a954a2615bd677777fe5ff6a0d5a1164c39b.dll
-
Size
182KB
-
MD5
f9ca965cf1b4b24fbcc44d49dee758d6
-
SHA1
856b8c6c65939296cf07e68267127a0b523c415e
-
SHA256
5ae75b8397d89ad209984ca27603a954a2615bd677777fe5ff6a0d5a1164c39b
-
SHA512
40a899ef576dbf2bf54b20e7c1e8379b857130120ad53f4f7037f57e9438328820623753b9bb1c14e3f6c557603dc290d5e402f4dbc9ecbdebc5f86e8cee8687
-
SSDEEP
3072:1a3gN0KjMqOdLdrjeiltOAWSBlF+2kr4Nv4ILEH0T8QfywWWEISDKO:M3gNFw3L1j77pBrK4lLnTfKl
Malware Config
Extracted
Family
strela
C2
94.159.113.79
Attributes
-
url_path
/up.php
Signatures
-
Detects Strela Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2696-0-0x0000000000140000-0x0000000000163000-memory.dmp family_strela behavioral1/memory/2696-1-0x0000000000140000-0x0000000000163000-memory.dmp family_strela -
Strela family