General

  • Target

    a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar

  • Size

    109KB

  • MD5

    90e0fb5c6cb86b7b12129108077f03b9

  • SHA1

    26f78fce02a512e1c14715cc5f76a98cab26282f

  • SHA256

    a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead

  • SHA512

    fcd2dc4bd1d65f4d92d4e482a9166df74a897f09cbfc0d4100fd65e3a6102951085b0554041b51b211327149ee74c99e703cdeb7c98497c3955a44cd8cc20233

  • SSDEEP

    3072:JsOq/Sv/eNHBeBy8BZMCOZ6mdbx9jHTuctPXZWyROqzyNw:Lq6v/e1gBy88Cy6wbx9vuctPUtqzyK

Score
10/10

Malware Config

Extracted

Family

strrat

C2

d4money.dynamic-dns.net:7888

d4money.dynamic-dns.net:7881

Attributes
  • license_id

    khonsari

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Signatures

  • Detects PowerShell content designed to retrieve passwords from host 1 IoCs
  • Strrat family

Files

  • a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar
    .jar