Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 18:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
48ebaa3363c502fa67f40a5e9c16ffe9b6364b79.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
48ebaa3363c502fa67f40a5e9c16ffe9b6364b79.dll
-
Size
470KB
-
MD5
4308674d36ffc7c5b2a8baa52fae0566
-
SHA1
48ebaa3363c502fa67f40a5e9c16ffe9b6364b79
-
SHA256
22ccef7f54687a062b9ed48a0bf1573e9cedd43c0f77594f9bb454f0ad69aa7e
-
SHA512
4cc21571ddc8c0803b80513c7e60d41df925124f0b6fea5309a0bf914b38439cf3f637afcad30224b4a9d34efa2c668f58b0592354a7a436a9737ad620bacec6
-
SSDEEP
12288:kQPEnQZ+MwOqDg6hphXNEVZjB/RoLMV3xZH:K8+HO6phXN0VBdv
Malware Config
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/856-0-0x0000000002970000-0x00000000029E4000-memory.dmp family_strela behavioral2/memory/856-1-0x0000000002970000-0x00000000029E4000-memory.dmp family_strela -
Strela family