Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 14:02 UTC

General

  • Target

    041acaec86cb0d59618404599ae423f0N.dll

  • Size

    123KB

  • MD5

    041acaec86cb0d59618404599ae423f0

  • SHA1

    d32503b01681d1ccd9befa488fd85a36ae88dbce

  • SHA256

    07207226bc3144d4fdb490bee53d295309c17ebdca4ac249da4c1b60be7d4bef

  • SHA512

    2f8c50c77f61eff51a1d56993cc91d0fe517bd4af8f400c990d6bd431d7c9e00a3689401b6a9ee017cb1525a3376dc2d810f0b1634de7cd8465f4f6c605d2798

  • SSDEEP

    1536:9b3ShcjtQxyUD2r2Cg5Bo9ek7AhDWrSRYa1q1jpQIwFboVzPf8x+WgwuBihAWiG:YqjGx4e8Aw+RaOIwBUsYAu4AWi

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\041acaec86cb0d59618404599ae423f0N.dll,#1
    1⤵
      PID:2544

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2544-0-0x00000000001D0000-0x00000000001F2000-memory.dmp

      Filesize

      136KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.