General

  • Target

    90e0fb5c6cb86b7b12129108077f03b9.bin

  • Size

    102KB

  • MD5

    c2d522c0f1b34fd7862c28b6d1688cbd

  • SHA1

    2e6fd66a6d06f225e742c9a830ef1b6c89c9aa22

  • SHA256

    113e817b7fc2240adf7c1cb807663ebbc1df541ed07c2f19d1a0ebab0db3f265

  • SHA512

    625faa92c7368c7af08174e1f405d27fcd75ba94bc1e9ebc1d88c3336fae4f51ecc07dbb02b45d0e7084758e9ccc44fef75a0da2882f6c432d26d8aa26cd560a

  • SSDEEP

    3072:P+jFkBQKkuyW24Zs7fO52v273Y6eaN5N8qBzhmiy:WjFkBDku92cO127oKvZ4iy

Score
10/10

Malware Config

Extracted

Family

strrat

C2

d4money.dynamic-dns.net:7888

d4money.dynamic-dns.net:7881

Attributes
  • license_id

    khonsari

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Signatures

Files

  • 90e0fb5c6cb86b7b12129108077f03b9.bin
    .zip

    Password: infected

  • a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar
    .jar