Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/07/2024, 11:59 UTC

General

  • Target

    a09962a1105cb7af6435e56f33a4b57b05e1539ba6ea112ef64705e24e29b290.dll

  • Size

    124KB

  • MD5

    978c20e131c31fbb7b4770c9320780e5

  • SHA1

    3e3ea85e7b533605ac8349cc8a7b3e7b4a8118bf

  • SHA256

    a09962a1105cb7af6435e56f33a4b57b05e1539ba6ea112ef64705e24e29b290

  • SHA512

    e949cdce135b561734d9938718541865b7123f19831886d991b79259eb66a138daf1f530842174737b458368f1503cff8c73a61ed9f4c9903c640e6314e99190

  • SSDEEP

    3072:qf+0qQTJNlCwwaHMQwVBIhm7JO1JG1Sk22oFuMILB/aHQv:CquJNlCwtRhmkO162s

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a09962a1105cb7af6435e56f33a4b57b05e1539ba6ea112ef64705e24e29b290.dll,#1
    1⤵
      PID:3948

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3948-0-0x000001D429A60000-0x000001D429A82000-memory.dmp

      Filesize

      136KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.