General
-
Target
JaffaCakes118_6c7639a4e8ffb3325bd4169a66204360
-
Size
233KB
-
Sample
250103-n4v1qsskhs
-
MD5
6c7639a4e8ffb3325bd4169a66204360
-
SHA1
f0ec98f3ec850274607f5f32b007c178534981a6
-
SHA256
5fca7b60c223f0cd83fd11627bcbad666b1bfb65417786b2b83a702ed34c8751
-
SHA512
ececb83b1f9f6db7b01e6cdc3615801e386897b3a7ce6461715de2e2e3e9ceb1aadac933b542c4fb91a2092b42a32fb1242b6f095d001ca2456b5b13ffc418a3
-
SSDEEP
6144:fcERZnnKkgYHi27BfOJMOVvZJUYQJoAlo1X33qLwRkEI:fcEjnliaO+OVvj7dn3GEI
Behavioral task
behavioral1
Sample
Juisreader.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
Juisreader.exe
-
Size
245KB
-
MD5
3bbf4e0b78fd24afaac4bf671d532450
-
SHA1
d886fa410702a53a08d1603b74f9711ca97a8ce4
-
SHA256
421b9f57ff0de8d193d1426552e5abaf90f5da54115da8cd228e0ad573dfa36c
-
SHA512
7b1ebaa2fbcc0c6e819342bef5332eecd167e2b71a757ff0788637114f47ce31124be823a8747375821e086fce620537431a019baf2d803237c475be94d00e9b
-
SSDEEP
6144:p1kpobhDnyPca7TJjG0ARL6Z9jyOruAa2JC8/AQoPScK1w/U4:pmWhWPcOj/k6yic8KPScr
-
Detects Strela Stealer payload
-
Strela family
-