Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 08:34 UTC

General

  • Target

    1512.dll

  • Size

    124KB

  • MD5

    7921fe961b3b8fb7d1a1f8c8b6bbc149

  • SHA1

    7bc93faf824edde654eca15888399f1866b4e773

  • SHA256

    3bd8c1a023ba1f5d798f1d29a706e5f3c4733ea18c35bd4c383946ca726772b3

  • SHA512

    8349cb98690926bb45028ba7010e1bc7a831782851ecf122a4a1336a6c19c52a0320963b22eba4c49df4b4e593821a6d478e53b29360e7eee5be16feee41592c

  • SSDEEP

    3072:ABnr11ScKsxFUkIFcZr5IgqDW1JnHIWKGcfHRi:cecLFUkIFcZCnW1BUPR

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1512.dll,#1
    1⤵
      PID:1916

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1916-0-0x0000000001E10000-0x0000000001E32000-memory.dmp

      Filesize

      136KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.