Analysis

  • max time kernel
    91s
  • max time network
    96s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-07-2024 11:59

General

  • Target

    1a72982a91c4fc71574c8067a2f065eb9e9e984d79e6dc9441a92c6ab5418c74.dll

  • Size

    124KB

  • MD5

    c58d242b7133f4e48b6bd2ede69da684

  • SHA1

    688b53e6eb96957a78d13623b9caea087ea7a609

  • SHA256

    1a72982a91c4fc71574c8067a2f065eb9e9e984d79e6dc9441a92c6ab5418c74

  • SHA512

    0fba3986c4d43fd0c94d25d36c84dd01bfa1c31087c03de114be566bf857638f6a687a1af487681e8878090dcc0f4942f047a73c7cdbea4612308bca5297c84e

  • SSDEEP

    3072:Y3cBvYYm9ACipoaeLdy26pm8F+wv0hazkeDAimwHhKD:gx9Alpoa0IXMapEim2K

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1a72982a91c4fc71574c8067a2f065eb9e9e984d79e6dc9441a92c6ab5418c74.dll,#1
    1⤵
      PID:4080

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4080-0-0x000001FFC2AB0000-0x000001FFC2AD2000-memory.dmp

      Filesize

      136KB