• (๑>؂•̀๑)
  • Home
  • Blog
  • Tags
  • Categories
  • Projects
  • Search ﹒◌﹒✦

Search

T1218.011

Found 1 related articles

Back to Tags
  • 2025-03-23

    Volatility3 Analysis of STRELASTEALER via Rundll32 Proxy Execution


    Detailed forensic analysis of a Windows memory dump using Volatility3 to investigate a compromise at a financial institution. The analysis identifies a hidden malicious PowerShell process (powershell.exe -windowstyle hidden) abusing WebDAV to execute a second-stage payload (3435.dll) via rundll32.exe. This activity aligns with MITRE ATT&CK sub-technique T1218.011. The investigation determines the attacker's C2 IP (45.9.74.32), the compromised user ('Elon'), and correlates the C2 infrastructure with the STRELASTEALER malware family.

    CyberDefenders DFIR Memory-Analysis Volatility3 Malware-Analysis StrelaStealer MITRE-ATTACK T1218.011 Rundll32 WebDAV-Abuse PowerShell-Execution