Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2023, 13:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
FE6WRF.dll
Resource
win7-20230220-en
2 signatures
150 seconds
General
-
Target
FE6WRF.dll
-
Size
327KB
-
MD5
9fa8a7248878e07e20094d101d5f21d0
-
SHA1
fe1765890ba7546b91faf7f09f962a326b0644cb
-
SHA256
f3fe692959c5078378e8221aa1da93b566c99737586291f2e2de88218d4df166
-
SHA512
c40d4603a0f62ed23c64733c17a630a59572b758a4842a173c8b904c72511a63893e8351db18ccd87ee37bf6a10adc6a6bad50eeb8655a3527737a31605fcdf5
-
SSDEEP
6144:ECV3OPCgqgrWK3FhbyIt+w8zgjOiGx2VTKnx:EC0Tl6mr/OqVKx
Malware Config
Extracted
Family
strela
C2
91.215.85.209
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.