Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2023, 05:56

General

  • Target

    m.dll

  • Size

    824KB

  • MD5

    a2b69839641d7043a44fb5ab41caa6eb

  • SHA1

    e7bbd6c12e8bda9de5369798a046a79317073ed2

  • SHA256

    f365c80c9c84a46c343d151d17919d6622bd20fe2e5cee7c061c983aa668f3dd

  • SHA512

    de747c0c8fbaab5b370fd42a5f173c2af04d3926969d2f9ed861195bd460b82b95b96568d1ffee6a3ff199682b44100687a5375280315958416b9674922a38f7

  • SSDEEP

    6144:rRTpcAQiqQifr8Ntj0wt7R+vDtxrl8Yx1QCRX503dUAJ7ealwFu9qXTKB5:lgiZiB9btD9QCU3OA9eaZQKT

Score
10/10

Malware Config

Extracted

Family

strela

C2

91.215.85.209

Signatures

  • Strela

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\m.dll,#1
    1⤵
      PID:2564

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2564-55-0x000000006D7C0000-0x000000006D896000-memory.dmp

      Filesize

      856KB

    • memory/2564-54-0x0000000000100000-0x0000000000121000-memory.dmp

      Filesize

      132KB

    • memory/2564-56-0x0000000000100000-0x0000000000121000-memory.dmp

      Filesize

      132KB