Analysis

  • max time kernel
    82s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 09:44

General

  • Target

    cc773750eff260dc5396f878e3a61f5a79689e0078e8b679b3152f7af027a429.dll

  • Size

    423KB

  • MD5

    61b36c912ee257240acc96c585ac2d9a

  • SHA1

    0045d3dd972045ea123c3baf108cb196ca216907

  • SHA256

    cc773750eff260dc5396f878e3a61f5a79689e0078e8b679b3152f7af027a429

  • SHA512

    04e6c25c0c747c1f5eecd6136b8fe94bd5bc50c999e28f871f8624cf7e2397b26723005627573a14fd6fcf610682190662b66488ebad16f8fbc3384dfca0eb11

  • SSDEEP

    12288:WXcYKk2fAfK0rkvtkuCKxuw6AWCxzIOp:acZk490rclrxSx/Op

Score
10/10

Malware Config

Extracted

Family

strela

C2

193.143.1.205

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\cc773750eff260dc5396f878e3a61f5a79689e0078e8b679b3152f7af027a429.dll
    1⤵
      PID:2152

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2152-0-0x0000000002C30000-0x0000000002C9B000-memory.dmp

      Filesize

      428KB