General
-
Target
990bc4b90a3d10f2ae085497a216e4f4.dll.exe
-
Size
138KB
-
Sample
241124-jfftpawncj
-
MD5
990bc4b90a3d10f2ae085497a216e4f4
-
SHA1
1202567c49e3a8c05dca5c0ce82dc6659e425f95
-
SHA256
48b51a6bedbda86249a1188c36a007f1ff8fdb3355a75b68eac7aa89ea5ad77a
-
SHA512
edbcd7a25d42c828abf247a72b7dec03d208c5d9d2f7d18d1eeac1711444587bfcc79aec89301e3b41c14a61f37e78c92180c269722337ade3a588536d3a1140
-
SSDEEP
3072:jnJR01T5K/tVwrwnF28z5Qnfo9db/Vq1LAZmonIbTxaZeaL0Q:1R0/K/tVHhQfojbtqSdSTxaZJ
Static task
static1
Behavioral task
behavioral1
Sample
990bc4b90a3d10f2ae085497a216e4f4.dll
Resource
win7-20240903-en
Malware Config
Extracted
strela
94.159.113.79
-
url_path
/up.php
Targets
-
-
Target
990bc4b90a3d10f2ae085497a216e4f4.dll.exe
-
Size
138KB
-
MD5
990bc4b90a3d10f2ae085497a216e4f4
-
SHA1
1202567c49e3a8c05dca5c0ce82dc6659e425f95
-
SHA256
48b51a6bedbda86249a1188c36a007f1ff8fdb3355a75b68eac7aa89ea5ad77a
-
SHA512
edbcd7a25d42c828abf247a72b7dec03d208c5d9d2f7d18d1eeac1711444587bfcc79aec89301e3b41c14a61f37e78c92180c269722337ade3a588536d3a1140
-
SSDEEP
3072:jnJR01T5K/tVwrwnF28z5Qnfo9db/Vq1LAZmonIbTxaZeaL0Q:1R0/K/tVHhQfojbtqSdSTxaZJ
-
Detects Strela Stealer payload
-
Strela family
-