Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 05:55

General

  • Target

    535edb95bff2ffdde49556dfe6bf33497c1d3a9e9e0766f84bef0d4ef1225664N.dll

  • Size

    401KB

  • MD5

    75cdb8fe79c2603d42f3cefeb8fb4f30

  • SHA1

    fe74c7ff5cfc914f73ccba82f37e504051ac0788

  • SHA256

    535edb95bff2ffdde49556dfe6bf33497c1d3a9e9e0766f84bef0d4ef1225664

  • SHA512

    3f05fe65e2ca39e5d8904875ce4ba295978da4051a3059131f277c1463c5d4b562db7ddadec5fef4d8fb789f5ef2f28a4e1fbe54f8dd42f7b8d857ff7f5d74c0

  • SSDEEP

    12288:ullQCI3ZL0lFxO8LxKDzbeqrcqqVVlBtQYf:ullbI3ZuxHL4beqrcqyt

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\535edb95bff2ffdde49556dfe6bf33497c1d3a9e9e0766f84bef0d4ef1225664N.dll
    1⤵
      PID:2424

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2424-1-0x00000000027F0000-0x0000000002850000-memory.dmp

      Filesize

      384KB

    • memory/2424-0-0x00000000027F0000-0x0000000002850000-memory.dmp

      Filesize

      384KB

    • memory/2424-2-0x00000000027F0000-0x0000000002850000-memory.dmp

      Filesize

      384KB