Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 00:59

General

  • Target

    2ddccba4b8e6fa446b5aba17e220e7f0N.dll

  • Size

    155KB

  • MD5

    2ddccba4b8e6fa446b5aba17e220e7f0

  • SHA1

    1f8fde42640b157ffed16b6b515b3546e7dc7d31

  • SHA256

    91b7e1eaee748a79977e7b152c1575232113f7376203052ab19d616b6dc5e3d0

  • SHA512

    adc8a68450894c60ce865f528a4d59d9770a113c468ec0b03aaba848533c0602be3485078ef0a03fc36c30433f6e1a19bd5504566ff232fa144f6804c09cf4d6

  • SSDEEP

    3072:yfMk/0N0ALLBbx55IofFxSoQg5/918vYpoocvgK5hSi7ixK2EAnLuJ:yfV7ALLBl7Fooz5F18HhvRSi7i42EsLQ

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.36

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\2ddccba4b8e6fa446b5aba17e220e7f0N.dll
    1⤵
      PID:2396

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2396-0-0x0000000000510000-0x0000000000532000-memory.dmp

      Filesize

      136KB