General
-
Target
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar
-
Size
109KB
-
Sample
240311-cqyzpaad2y
-
MD5
90e0fb5c6cb86b7b12129108077f03b9
-
SHA1
26f78fce02a512e1c14715cc5f76a98cab26282f
-
SHA256
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead
-
SHA512
fcd2dc4bd1d65f4d92d4e482a9166df74a897f09cbfc0d4100fd65e3a6102951085b0554041b51b211327149ee74c99e703cdeb7c98497c3955a44cd8cc20233
-
SSDEEP
3072:JsOq/Sv/eNHBeBy8BZMCOZ6mdbx9jHTuctPXZWyROqzyNw:Lq6v/e1gBy88Cy6wbx9vuctPUtqzyK
Behavioral task
behavioral1
Sample
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar
Resource
win10v2004-20240226-en
Malware Config
Extracted
strrat
d4money.dynamic-dns.net:7888
d4money.dynamic-dns.net:7881
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar
-
Size
109KB
-
MD5
90e0fb5c6cb86b7b12129108077f03b9
-
SHA1
26f78fce02a512e1c14715cc5f76a98cab26282f
-
SHA256
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead
-
SHA512
fcd2dc4bd1d65f4d92d4e482a9166df74a897f09cbfc0d4100fd65e3a6102951085b0554041b51b211327149ee74c99e703cdeb7c98497c3955a44cd8cc20233
-
SSDEEP
3072:JsOq/Sv/eNHBeBy8BZMCOZ6mdbx9jHTuctPXZWyROqzyNw:Lq6v/e1gBy88Cy6wbx9vuctPUtqzyK
Score7/10-
Modifies file permissions
-