General
-
Target
25eb4023fba770092e7817c41ee2af7f
-
Size
96KB
-
Sample
231231-dp8yyahea6
-
MD5
25eb4023fba770092e7817c41ee2af7f
-
SHA1
9388e6a1a243555daa485892d2a4269d0827cab0
-
SHA256
bf25d7b400a7512ea948f5d98b39bf4729e3292f65dff05a289b779c25d23cea
-
SHA512
213a2e2431582ad7233aedf88a537e23294d55b9688bdaaee7043321a33843e3051ff056539349fce5776532ddb7929d4873d6aeee0334ea78810fe4fb312149
-
SSDEEP
3072:CNINhFRrqZepZsmWPPhRj4gvUpZ4/05V/:CXZ6spPjjRcpK0T/
Behavioral task
behavioral1
Sample
000122223.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
000122223.jar
Resource
win10v2004-20231215-en
Malware Config
Extracted
strrat
dollarsat.dynamic-dns.net:1781
dollarsat.dynamic-dns.net:1780
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
000122223.jar
-
Size
102KB
-
MD5
d375b26e07150dc37dae2ce7d22a586b
-
SHA1
8d4ec9d1b48c5cd2ffaeae674c8e93b489a5c171
-
SHA256
56f0a10c33da16a1d597d2772bca21ae3e39cc179cf31eef3fa623480580bb61
-
SHA512
6b388b840e70b988345be952efdce79d830934abb49dcbc6060441a0cd58014de4cd4ed19743adce77ee7af0133fe7db00d10a5d578754fb8d714e9f8925b3ec
-
SSDEEP
1536:cjSW+gbZj1hXLp8tmGiwvzk//zNpPShwbRWNcRcqrdHc4CSshc/6yN6:cjSW+QZjHX6tgGadAqp8nSsnyM
Score1/10 -