Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 22:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
096b98a80ca7a602dfa193d4b75c767cc3e885026e0ac101980abce52493cb44N.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
120 seconds
General
-
Target
096b98a80ca7a602dfa193d4b75c767cc3e885026e0ac101980abce52493cb44N.dll
-
Size
407KB
-
MD5
e1cc5bcba6b890fdf9b6127a76944f60
-
SHA1
1e115345cec090f6849c408c051334331cb4476c
-
SHA256
096b98a80ca7a602dfa193d4b75c767cc3e885026e0ac101980abce52493cb44
-
SHA512
950a9c51752f3858b3fb1d220785fbdbac0640ce6f6940ea701ec37124971e3f30a71e5bcf3c9ca21cceca7970790b5916c31952aaf1018c939cb094df20b534
-
SSDEEP
12288:0xDVdlB3h69VkyuyOImcVF9cRGsZlYEZSItZQXG12Vpbur:UDVxoVJvpmcf9cRrFUItZQXG12Vpbur
Malware Config
Signatures
-
Detects Strela Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/3292-1-0x0000000001120000-0x0000000001180000-memory.dmp family_strela behavioral2/memory/3292-0-0x0000000001120000-0x0000000001180000-memory.dmp family_strela behavioral2/memory/3292-2-0x0000000001120000-0x0000000001180000-memory.dmp family_strela -
Strela family