Analysis
-
max time kernel
137s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-es -
resource tags
arch:x64arch:x86image:win10v2004-20240709-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
25-07-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
e628a4cd45ccb2dadd2fe5b6921b935163bea32afcf699e8fb266f4b68b683b5.dll
Resource
win7-20240708-es
Behavioral task
behavioral2
Sample
e628a4cd45ccb2dadd2fe5b6921b935163bea32afcf699e8fb266f4b68b683b5.dll
Resource
win10v2004-20240709-es
General
-
Target
e628a4cd45ccb2dadd2fe5b6921b935163bea32afcf699e8fb266f4b68b683b5.dll
-
Size
179KB
-
MD5
25723154e97d8d4fe4a059148eb5cc3c
-
SHA1
d36c3f69e2233b333c3ac28c59e48163f9d247b2
-
SHA256
e628a4cd45ccb2dadd2fe5b6921b935163bea32afcf699e8fb266f4b68b683b5
-
SHA512
bfb8ad3e740af4a6476c3bbd6d0e7b81223efc5f1ac23c13106596d41587efded23d0b6e8069eb416ff64193fdecbac819233df13f39f0fc0e896c205a0a4031
-
SSDEEP
3072:ynKVy5r+/rMWiRll1xCdsMfyPzwtf/Vjs0ohqRu0utj6SC8gjihuth5UMDKk:MKVy5r+jPiPrxCyMKrMfds0oh4u0uVFs
Malware Config
Extracted
strela
45.9.74.36
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/4956-0-0x0000000002790000-0x00000000027B2000-memory.dmp family_strela behavioral2/memory/4956-1-0x0000000002790000-0x00000000027B2000-memory.dmp family_strela -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regsvr32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regsvr32.exe