Behavioral task
behavioral1
Sample
35f6af9f091df52735d6553f87a5d49f0f34be5a4828601824bc912d0153ee49.jar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
35f6af9f091df52735d6553f87a5d49f0f34be5a4828601824bc912d0153ee49.jar
Resource
win10v2004-20231222-en
General
-
Target
5f93908dcb1207928c62b858e8a2519d.bin
-
Size
158KB
-
MD5
c6eff7d5fa7e2c9813f49b81fd428096
-
SHA1
a202e9576c0b94157c29ddef915e8035d03e6d86
-
SHA256
b8c7fed360001ee6a3e02fc1d26e416b39abd5ce4cd19fd37b7252f6d47bcfc8
-
SHA512
4095081d584005b4b9ad397a7e0b3ef6eadb04d401a72bcc49d9810abbb4e98fd521c622d660de9e8ed357260457e410e621481d6cab47b5c1eb97c385009c73
-
SSDEEP
3072:05UcjMz21wiRPebizvv9GdxgHzCbQKdaDeUfyT4b1MLp3v9D2BaLutP:iCzmJeMaxEOTdaDeDcb1wpxkP
Malware Config
Extracted
strrat
50kteam.dynamic-dns.net:1781
50kteam.dynamic-dns.net:1780
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Signatures
-
Strrat family
Files
-
5f93908dcb1207928c62b858e8a2519d.bin.zip
Password: infected
-
35f6af9f091df52735d6553f87a5d49f0f34be5a4828601824bc912d0153ee49.jar.jar