General
-
Target
3189efaf23301_mail77d2817cfb69a8bfa3b846c24ec534aa3e6b66c8a28f3b18d4bXxX6Zip.zip
-
Size
178KB
-
Sample
241103-tk2basyakf
-
MD5
e2936de211b980bb9bc042c04348978e
-
SHA1
f16890fb143741ec118befd22f6903a18f8f1315
-
SHA256
3189efaf2330177d2817cfb69a8bfa3b846c24ec534aa3e6b66c8a28f3b18d4b
-
SHA512
2ac2aca1bc368a6fe4851a0da13dc699c3c534d1937cb313bf27df2ea87502240739fdafb9ddc2f3b99faf653b526ded3aec2e6a12e7d11f05c14c87f709fe92
-
SSDEEP
3072:BcT+wa/SAEaXK17HBv6c7G9H2WvC88sMTES3nHxBhrycbExqe/VGkpFLDeh:mLa4aXK17HBv6c7y2uerhrycALFFLDeh
Static task
static1
Behavioral task
behavioral1
Sample
18262829011200.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
18262829011200.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
strela
193.109.85.231
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Targets
-
-
Target
18262829011200.js
-
Size
345KB
-
MD5
301503edfb1ea723b231b416c2a81f0f
-
SHA1
dd41fda85637d2593ef4aad407371ec830fe171d
-
SHA256
544887bc3f0dccb610dd7ba35b498a03ea32fca047e133a0639d5bca61cc6f45
-
SHA512
f5df4b28a0f012b458026ef7caa2f460f51476a67e63e63641631dc5672b4920422618afb36af17373ffdfcc678370dc965678f3d3f1dda5326589c2a471f9d5
-
SSDEEP
6144:FSxcuKYMvWe+ch9Bi7PoOCSElpHMnOInDOWPZsngSKTj+c42pf:+cRYMv5+ctgEBmODYsw+h2pf
Score10/10-
Detects Strela Stealer payload
-
Strela family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-