Analysis

  • max time kernel
    139s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2024 02:47

General

  • Target

    24072024_0247_2325616694802.dll

  • Size

    180KB

  • MD5

    12d24d4b3ed5bbaf16d7f6136ef0a6db

  • SHA1

    bd84529de261dfd846f5b099e91384ca4b68bed2

  • SHA256

    50bdc4f931426cf6deb104cc1cfa46f0ef88134221a07977d45a5fb60d8f2ffc

  • SHA512

    52b0ca87a18510d2cadb62eb34a7fd312bec6cb3c26fb805ecadc7e7e23529b6bc7a7a7bd7bd1ac8e1d6d4c383217bbf95f2bef9af1722ad09a139fabe0b44d4

  • SSDEEP

    3072:D+ndOFYNAhXcpbl3JV5pkSKvEuU9H4mNQDTh8yJd7p9qhH2pN81d2Zq:DEsVhqVnwQH4mNQDPJR2W80

Score
10/10

Malware Config

Extracted

Family

strela

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\24072024_0247_2325616694802.dll
    1⤵
      PID:2860

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2860-0-0x0000000002F20000-0x0000000002F42000-memory.dmp

      Filesize

      136KB