Analysis

  • max time kernel
    29s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 04:36

General

  • Target

    6b6cd60ca26b19a8cbb2c4e4e98b2270N.dll

  • Size

    124KB

  • MD5

    6b6cd60ca26b19a8cbb2c4e4e98b2270

  • SHA1

    8b3157e60edfbe5215366fc0d2712ec833db7860

  • SHA256

    22126c1b7b5b8180bdf590b739652e4c65455e69505a774b01791c497bb1c3dc

  • SHA512

    4d7a9c935a3950f47442299dfc5bb48f48e2714985babbc3576cf19945a9a7aac5c772748defbc3ff9bee5f632b4d11dfa5a3722e5866a3086030445b31c5758

  • SSDEEP

    3072:T8np1HqNfyq7FPXpwfXQdLVbxAP3QL7zXV1mbqC9+GnD:EKN9NXpwfAdZGP3KXXV1Mz9t

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6b6cd60ca26b19a8cbb2c4e4e98b2270N.dll,#1
    1⤵
      PID:2336

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2336-0-0x0000000001B10000-0x0000000001B32000-memory.dmp

      Filesize

      136KB

    • memory/2336-1-0x0000000001B10000-0x0000000001B32000-memory.dmp

      Filesize

      136KB