Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 12:04

General

  • Target

    47492512285cec649a1ed95fe7f35a1e0753e6a5480d665f82bbf1549835d294.dll

  • Size

    123KB

  • MD5

    75ae79aa4b358041b0bcfd3fdf776b9c

  • SHA1

    f9ab581cdc23fca5e24068f7ebdac78edbc9ec96

  • SHA256

    47492512285cec649a1ed95fe7f35a1e0753e6a5480d665f82bbf1549835d294

  • SHA512

    899671777dd5fabee83466a256944986b02f02592bd7b289b1a3a44d0ecdc8336914bc68dcec8c5c57c91a682116f3692518c08ed2d1b7731f4b853b426e3975

  • SSDEEP

    3072:QTgpHKifqcM4EBQhWtimC0nprpapsdPtRG640R:QIHKiflnEBQ00mnusxG640

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\47492512285cec649a1ed95fe7f35a1e0753e6a5480d665f82bbf1549835d294.dll,#1
    1⤵
      PID:624

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/624-0-0x000001A7CDB90000-0x000001A7CDBB2000-memory.dmp

      Filesize

      136KB