Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-07-2024 08:13

General

  • Target

    7562e0c3e5fb3fa50c50a132e457f150N.dll

  • Size

    161KB

  • MD5

    7562e0c3e5fb3fa50c50a132e457f150

  • SHA1

    3353658e7139877a6932edd7398c252fe89728f3

  • SHA256

    7d4d02acad5ade50cd1cc8c8ac532d13e7b98b1be5f61faca95b8193ca4de1a3

  • SHA512

    7c7e23204ae8158924c720e3eea9873e018c6724bcbe573c0fbc8c32758ed3e14577dd804bf2f4e3eff34efdadb872936dd2cac42dc7ded2d66750f34ec2df81

  • SSDEEP

    3072:tv4a39D0jzFHjk/SKvEuU9H4mNQDTh8yJd7p9qhH2pN81d2Zq:qa3l01DkKwQH4mNQDPJR2W80

Score
10/10

Malware Config

Extracted

Family

strela

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7562e0c3e5fb3fa50c50a132e457f150N.dll
    1⤵
      PID:2456

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2456-0-0x0000000000230000-0x0000000000252000-memory.dmp

      Filesize

      136KB