Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2024, 00:29

General

  • Target

    3941256ae9ae36b3bc4ce7b5c0d1fe60N.dll

  • Size

    124KB

  • MD5

    3941256ae9ae36b3bc4ce7b5c0d1fe60

  • SHA1

    5c41dd5f26db545ecb73fce973684764d64518b6

  • SHA256

    a2240d2626e83d08ea3b861c8df960308b5ce1dfb3dc108ba9a1e4ba686ebc2d

  • SHA512

    76ea5d5252f246987560ba7a20bf37de776076c6f500e067e3cded1e03507c79dd38efe89343340c5df525a99a8f7e1ed7540bc10c6daf03f8bde0a9f69f4087

  • SSDEEP

    1536:4paZ4kOXOAH7ND7Est//+DKD4/YdmmwiyosE1NgsOn7ttlIA+4nb/Up0GZTl5m:4sZ4rt5DN34/YXwG1NQtoAB/E0Gl

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 2 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3941256ae9ae36b3bc4ce7b5c0d1fe60N.dll,#1
    1⤵
      PID:4228

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4228-0-0x000001C909000000-0x000001C909022000-memory.dmp

            Filesize

            136KB

          • memory/4228-1-0x000001C909000000-0x000001C909022000-memory.dmp

            Filesize

            136KB