General

  • Target

    03e4c903cc2cbe8854e6af1bd5e741d88da5c35732c7b051215ecf9d6be10c10.zip

  • Size

    202KB

  • MD5

    b7e9059b071b6df692c7d40d89eb6302

  • SHA1

    b7e5434fe0609b0f03fa7554965fb1b8226d4e60

  • SHA256

    710936b30fa17d2dca11ee41ed0cc3a2c50cc356230e10f51f099f457d7399ed

  • SHA512

    8f17738847ab58e5dae30e551e9d310e782b38e098d9e491907ce830d86b73f46d39058623ff7f2bc054580894245dd0b9228fb6ee2b1c4c78913987b86b6add

  • SSDEEP

    6144:e8e9mZlglxYe+evuwsbwUjOP8UA6BLe6b:et98gXYqsbKP8V69eo

Score
10/10

Malware Config

Extracted

Family

strrat

C2

jugoken567.ddns.net:7800

103.151.123.225:7800

Attributes
  • license_id

    DB1U-CVGT-7HUG-X0A0-GNWH

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Signatures

Files

  • 03e4c903cc2cbe8854e6af1bd5e741d88da5c35732c7b051215ecf9d6be10c10.zip
    .zip

    Password: infected

  • 03e4c903cc2cbe8854e6af1bd5e741d88da5c35732c7b051215ecf9d6be10c10.jar
    .jar