Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 11:25

General

  • Target

    b28a7069aeeaa4f67b7875abda8233a0N.dll

  • Size

    291KB

  • MD5

    b28a7069aeeaa4f67b7875abda8233a0

  • SHA1

    9ce9a91c2b487d392647761f65d2b925513fa986

  • SHA256

    d9c79a05ddaa2c043389647f03b9ca97416b80af2f63341c0714d9f7239eb8d8

  • SHA512

    6a7a3719ce61ced1594804cc5c60e9f580b97537e4b6af752ae9963051acc75d9bb0cf98f97dc0be20317b9f71bc5ad134042bf92d7a80331ff524746b1674d6

  • SSDEEP

    3072:9AzD8HvlbCZw7Xn9UzP5UKh/YOxhNrRAB/35pIDMOCJpN+TSo4WE02rbntcbzK/i:uglbCZKKzP5Uc/Y6/yR5KCpXJe0UB

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.176

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Signatures

  • Detects Strela Stealer payload 2 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b28a7069aeeaa4f67b7875abda8233a0N.dll
    1⤵
      PID:1364

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1364-0-0x00007FFD12EB0000-0x00007FFD12F00000-memory.dmp

      Filesize

      320KB

    • memory/1364-1-0x0000000005720000-0x0000000005742000-memory.dmp

      Filesize

      136KB