Resubmissions

14-01-2025 12:42

250114-pxh82azpek 3

14-01-2025 10:56

250114-m1n8cayjgk 10

Analysis

  • max time kernel
    95s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2025 10:56

General

  • Target

    10189150612951.dll

  • Size

    437KB

  • MD5

    c173b62046ba5017cb09cd5132e7c07a

  • SHA1

    f86dd6ed5d08fe1fab68f4425fbf1e8dd65e2f76

  • SHA256

    3f2f6ffd645ddfd989ba34115a1312ba9990bf7430b6b8c2fd884eb37531786b

  • SHA512

    056c81920274e44ca27cb461b022ccda4d2e7bdd51acad72be3b0f1d568e94381920410a0da77d5b6ac75e205cdf4d6305f40e3a6766402861d172014bd09778

  • SSDEEP

    12288:M+2K8JHTytWhL/KqCaELVefIknseh8hFK2:MFJfBBxNs

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\10189150612951.dll
    1⤵
      PID:980

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/980-0-0x0000000002230000-0x000000000229B000-memory.dmp

      Filesize

      428KB