Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 12:03

General

  • Target

    285e78351be0b6cc411971b2edb48978cda68d369665b544a110960c03a86f8f.dll

  • Size

    124KB

  • MD5

    2e3d913b4b885341f24bd4b1ab01a306

  • SHA1

    abee5eb4e53b784f746da82efb974497ea4f3297

  • SHA256

    285e78351be0b6cc411971b2edb48978cda68d369665b544a110960c03a86f8f

  • SHA512

    1a8e6ed8bc97b7a98eb01b77383e612516b158a7db1342fdb7e7e4c9072d2483e7ceaf8db33cecf3bcb2948656db9df82e487d36ba4953dfe4f860b7307f0209

  • SSDEEP

    3072:GVD705tDfA4DAxoYJHz1V7DwezHrd5EZ+:gU5tDYiYJr7D/r4+

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 2 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\285e78351be0b6cc411971b2edb48978cda68d369665b544a110960c03a86f8f.dll,#1
    1⤵
      PID:1696

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1696-0-0x000001CF430A0000-0x000001CF430C2000-memory.dmp

            Filesize

            136KB

          • memory/1696-1-0x000001CF430A0000-0x000001CF430C2000-memory.dmp

            Filesize

            136KB