General
-
Target
9d4454e5dddbd45f929f2c2e2e9ec5bc_JaffaCakes118
-
Size
233KB
-
Sample
240816-g414eszdma
-
MD5
9d4454e5dddbd45f929f2c2e2e9ec5bc
-
SHA1
036faab45c38b5e4331a8193fce18f4de60c9dac
-
SHA256
fa91bab089c7939690a419f0c510e10d4cb225ad1b72cef7375a752c7d5e3542
-
SHA512
bf2b70798be9ce04eb02d153ce6ae487a201dcd076d635b510a388883d9a64fc479eb65abce9cbe6fd38e09f784c0187ab7acccb8261097e3b2c8448d5ab094a
-
SSDEEP
6144:0bYMlPgfq2f29LqZPZvGo91bUPUzYJjzB/XFqULS7CiTwhCYfMkvWU:0bYMlT2f2s7Oo9WZ3S7GoYh
Behavioral task
behavioral1
Sample
Juisreader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Juisreader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Juisreader.exe
-
Size
245KB
-
MD5
3bbf4e0b78fd24afaac4bf671d532450
-
SHA1
d886fa410702a53a08d1603b74f9711ca97a8ce4
-
SHA256
421b9f57ff0de8d193d1426552e5abaf90f5da54115da8cd228e0ad573dfa36c
-
SHA512
7b1ebaa2fbcc0c6e819342bef5332eecd167e2b71a757ff0788637114f47ce31124be823a8747375821e086fce620537431a019baf2d803237c475be94d00e9b
-
SSDEEP
6144:p1kpobhDnyPca7TJjG0ARL6Z9jyOruAa2JC8/AQoPScK1w/U4:pmWhWPcOj/k6yic8KPScr
-
Detects Strela Stealer payload
-
-
-
Target
新云软件.url
-
Size
133B
-
MD5
4f0017b3b346bd0626f0c3b915e6e734
-
SHA1
823bf3ff9e16cd636c9dc0dc690d6a586fcbfe92
-
SHA256
df65af1fc1e09f6effbde7e0ef1cb64d6caeef1f62b0e6467821efa032533678
-
SHA512
0f5eb5024cf6a0323f7998d419995a707c48de917a5899a185369e6acfeb17c09ffa03f7d110adc87b8de20b7d4bf30d50c72479bfb18614d2e21cbe169dc5a6
Score1/10 -