Analysis
-
max time kernel
95s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 21:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
208f7b61a9535f4c391bb438d294300fc61e8605809185cd94b655584ad383f5.dll
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
208f7b61a9535f4c391bb438d294300fc61e8605809185cd94b655584ad383f5.dll
-
Size
397KB
-
MD5
9da756ae6d3ba91243bc6626a4690ce4
-
SHA1
ed9fdd36ea02f4b7809d898cce7ec11ccbbf6986
-
SHA256
208f7b61a9535f4c391bb438d294300fc61e8605809185cd94b655584ad383f5
-
SHA512
ba00be1ec4f17fe9144be6864ddd4276d5dc6427bdea80b41553c5d8575cce79ba9bb3b2a2e1300c09340544a0d423cde1f99f3f1217f4ecf7f63222a495234d
-
SSDEEP
6144:x9l1ud7j/7mYfSDHRoq1OGCXYZyVo+uOInJHW44dwO24Koi4Zzq7kM8nwNC:TudngemOGCX/KJHWrqx4Koi4RqwJuC
Malware Config
Signatures
-
Detects Strela Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4804-0-0x00000000007E0000-0x0000000000840000-memory.dmp family_strela behavioral2/memory/4804-1-0x00000000007E0000-0x0000000000840000-memory.dmp family_strela behavioral2/memory/4804-2-0x00000000007E0000-0x0000000000840000-memory.dmp family_strela -
Strela family