Analysis
-
max time kernel
70s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 04:13
Static task
static1
Behavioral task
behavioral1
Sample
6d49364f640e5e69b66c18be39f5b2553aecd98c400bd3e34056b8ac99a8d5efN.dll
Resource
win7-20240903-en
General
-
Target
6d49364f640e5e69b66c18be39f5b2553aecd98c400bd3e34056b8ac99a8d5efN.dll
-
Size
174KB
-
MD5
d635426467ed881a11a592c67a3ee630
-
SHA1
b4531f28ed9e955572b9156f43247e9ca64f41ea
-
SHA256
6d49364f640e5e69b66c18be39f5b2553aecd98c400bd3e34056b8ac99a8d5ef
-
SHA512
3941ae57040d26117e4212232d4c611b6f9cd61a3d6d522f980d57e4717ef6682113b53c17885ea503a5b99bd98c512f756a95e1f8aede1be618f464fb3d6ee5
-
SSDEEP
3072:PmrC0+bi8Y21IB1yx7ASxbgmTntSDkXcHAqdqWATKN8zWAE5zY:P/0+bix21wO7AVmD2IcHzJATKmCz
Malware Config
Extracted
strela
91.215.85.209
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Signatures
-
Detects Strela Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/2140-0-0x0000000001D90000-0x0000000001DB1000-memory.dmp family_strela behavioral1/memory/2140-1-0x000000006D7C0000-0x000000006D7F9000-memory.dmp family_strela behavioral1/memory/2140-2-0x0000000001D90000-0x0000000001DB1000-memory.dmp family_strela -
Strela family