Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 04:13
Static task
static1
Behavioral task
behavioral1
Sample
6d49364f640e5e69b66c18be39f5b2553aecd98c400bd3e34056b8ac99a8d5efN.dll
Resource
win7-20240903-en
General
-
Target
6d49364f640e5e69b66c18be39f5b2553aecd98c400bd3e34056b8ac99a8d5efN.dll
-
Size
174KB
-
MD5
d635426467ed881a11a592c67a3ee630
-
SHA1
b4531f28ed9e955572b9156f43247e9ca64f41ea
-
SHA256
6d49364f640e5e69b66c18be39f5b2553aecd98c400bd3e34056b8ac99a8d5ef
-
SHA512
3941ae57040d26117e4212232d4c611b6f9cd61a3d6d522f980d57e4717ef6682113b53c17885ea503a5b99bd98c512f756a95e1f8aede1be618f464fb3d6ee5
-
SSDEEP
3072:PmrC0+bi8Y21IB1yx7ASxbgmTntSDkXcHAqdqWATKN8zWAE5zY:P/0+bix21wO7AVmD2IcHzJATKmCz
Malware Config
Extracted
strela
91.215.85.209
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Signatures
-
Detects Strela Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/3240-0-0x000001D61B8F0000-0x000001D61B911000-memory.dmp family_strela behavioral2/memory/3240-2-0x000001D61B8F0000-0x000001D61B911000-memory.dmp family_strela behavioral2/memory/3240-1-0x000000006D7C0000-0x000000006D7F9000-memory.dmp family_strela -
Strela family