General
-
Target
c3da4585720e86d892d8bc988_JC.exe
-
Size
253KB
-
Sample
241203-ldrvaayqc1
-
MD5
200ba5b5bc4ed835338eea210d5b56c5
-
SHA1
73a93f37288c09dff35d6c520e813624899056ef
-
SHA256
c3da4585720e86d892d8bc9881f37549d91df5112ae04a1932fd051884332f3a
-
SHA512
c4dd276ab466aeb3da0a0b26ade2f3ec2b6853f0ee78eabede398c9ca74c97e20852056f0fbe5a047c082632387d937362357e489f877fd58a95167c3f4bab7e
-
SSDEEP
6144:jtJwgjhk0JMUkf7rNc6SIvahAu2JvassGwekaa5TKED:j4gjadUkft3S0sAu2JMTekaahKK
Static task
static1
Behavioral task
behavioral1
Sample
c3da4585720e86d892d8bc988_JC.dll
Resource
win7-20240903-en
Malware Config
Extracted
strela
91.215.85.209
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Targets
-
-
Target
c3da4585720e86d892d8bc988_JC.exe
-
Size
253KB
-
MD5
200ba5b5bc4ed835338eea210d5b56c5
-
SHA1
73a93f37288c09dff35d6c520e813624899056ef
-
SHA256
c3da4585720e86d892d8bc9881f37549d91df5112ae04a1932fd051884332f3a
-
SHA512
c4dd276ab466aeb3da0a0b26ade2f3ec2b6853f0ee78eabede398c9ca74c97e20852056f0fbe5a047c082632387d937362357e489f877fd58a95167c3f4bab7e
-
SSDEEP
6144:jtJwgjhk0JMUkf7rNc6SIvahAu2JvassGwekaa5TKED:j4gjadUkft3S0sAu2JMTekaahKK
-
Detects Strela Stealer payload
-
Strela family
-