Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 10:33 UTC

General

  • Target

    1005.dll

  • Size

    123KB

  • MD5

    d933abd426e85aee86a9553a57a2cb22

  • SHA1

    0647d3205d4fc003597c4d992dd7ff547a8b269b

  • SHA256

    b1714906c9037f443e25c5862a0059abcf623be36ad914d1009a7f93250531fd

  • SHA512

    dbdd6fd8862dcfb84c8f06af50545ba6f0cbe991f51930409d83b14eea9a34348dd196b4f92334e0fbec30af2912afcf89821b045e1042b4805e75e52f382476

  • SSDEEP

    3072:VY5DvIdqwcHx7wE2gcGvKutj2d/q9Gswo:4DvIdXc6E2XGvKutj23Bo

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1005.dll,#1
    1⤵
      PID:2308

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2308-0-0x0000000000160000-0x0000000000182000-memory.dmp

      Filesize

      136KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.