Analysis

  • max time kernel
    11s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 08:32

General

  • Target

    9490ed3673ef571816040d923f51be20N.dll

  • Size

    125KB

  • MD5

    9490ed3673ef571816040d923f51be20

  • SHA1

    d79d0a274943d82066ba2c36f3d8f176be89d8da

  • SHA256

    a49c69bb42d3e21102275db54f60e6bdbaf5ecb8bd477e680863c9fb8ba7e435

  • SHA512

    d972a3c4b0ee975fab46944a56215693580b8144d0017d13e89398a832ccedc4ee1c396a7dbcf3a82165ecf9b94ece04a7700b4bff70fb57728ad45e2789edec

  • SSDEEP

    3072:ATS6drATtAtERpku/TAESKN2tX1M0v/jhJsMsdW:AGW6tAtERTHSoK1Zv/jps8

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9490ed3673ef571816040d923f51be20N.dll,#1
    1⤵
      PID:2556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2556-0-0x00000000003D0000-0x00000000003F2000-memory.dmp

      Filesize

      136KB