Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 00:06

General

  • Target

    8c5ae2b48f83f491acbbdc493cb1db487fbf433bb3b303604c2e1aef6e1a9c4e.dll

  • Size

    181KB

  • MD5

    5f2bb4406ecf01f1e938090b2b2a1684

  • SHA1

    328809e6f660adbc11c3c9be00e95b9914c01cbe

  • SHA256

    8c5ae2b48f83f491acbbdc493cb1db487fbf433bb3b303604c2e1aef6e1a9c4e

  • SHA512

    65fe0aa322ed7c0b9775ddf04c30e0f8849207bbb679ae8284e0bae1fbd0da26d65d5bd7e10be28ed6165471ed47bac75af050ff9b816264a366a1ef66ba2435

  • SSDEEP

    3072:wE6I7myrvsZ7maj+CRorrR4DnwKX+klLQUlfWo/bw/CSaE/szYwObSWN0o4Nm0hj:nv2T+C8rKDnwkh5fsCSaJnVm0E

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.36

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\8c5ae2b48f83f491acbbdc493cb1db487fbf433bb3b303604c2e1aef6e1a9c4e.dll
    1⤵
      PID:2700

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2700-0-0x0000000000210000-0x0000000000232000-memory.dmp

      Filesize

      136KB