Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-07-2024 12:26

General

  • Target

    adf30c8fd8a9045a789582593f1a9a4b3e2a381bda6b9e360cf14169e831c844.dll

  • Size

    125KB

  • MD5

    24b503e07089e25a7ce594921de2791c

  • SHA1

    c80728584a879e41f80a536225157f0b98c23313

  • SHA256

    adf30c8fd8a9045a789582593f1a9a4b3e2a381bda6b9e360cf14169e831c844

  • SHA512

    ed3ca127fc12a923352e93ba50b3e9369a82a06124f887389fe82e020a887c608617950de5d32305972dd274cdf47d8619c725b9726b1ee30bbde97368d806bb

  • SSDEEP

    1536:lAAIhvgwLTfLNEwEBBAA88JXuPK73YATBGj06cSrRCTSnuW/6Jqp653Qh8rCO/EX:hIXnfWBBRpZZ7NQI5TMuJqoWmr

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\adf30c8fd8a9045a789582593f1a9a4b3e2a381bda6b9e360cf14169e831c844.dll,#1
    1⤵
      PID:2900

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2900-0-0x000001A7DCC10000-0x000001A7DCC32000-memory.dmp

      Filesize

      136KB