Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 00:05

General

  • Target

    3359c83d024d2c030cc4c8ba3dd487b0N.dll

  • Size

    123KB

  • MD5

    3359c83d024d2c030cc4c8ba3dd487b0

  • SHA1

    20b1d2477fe16010788f2a7662f4717c78743f01

  • SHA256

    01e7e743740b49e72150c176892794c2f7661768fec6169f98a404b924e242c4

  • SHA512

    88d47ea5504e4b80a4edf30af54f419e940a582f4c02dffb004139ab5ce5d9afcb363c580e5e353fc9e77fc2c52441c74f43ef0d59d3c5c39f23f851bc4773fb

  • SSDEEP

    3072:4m2W4HyYFNy3usAXVuLbMnm62bD4hJYJIegHCRbs9gO7h7:xSz2upFusm6I4h+JIeICRbs917h7

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 2 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3359c83d024d2c030cc4c8ba3dd487b0N.dll,#1
    1⤵
      PID:4412

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4412-0-0x000001D8E1450000-0x000001D8E1472000-memory.dmp

      Filesize

      136KB

    • memory/4412-1-0x000001D8E1450000-0x000001D8E1472000-memory.dmp

      Filesize

      136KB