Behavioral task
behavioral1
Sample
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar
Resource
win10v2004-20240226-en
General
-
Target
90e0fb5c6cb86b7b12129108077f03b9.bin
-
Size
102KB
-
MD5
c2d522c0f1b34fd7862c28b6d1688cbd
-
SHA1
2e6fd66a6d06f225e742c9a830ef1b6c89c9aa22
-
SHA256
113e817b7fc2240adf7c1cb807663ebbc1df541ed07c2f19d1a0ebab0db3f265
-
SHA512
625faa92c7368c7af08174e1f405d27fcd75ba94bc1e9ebc1d88c3336fae4f51ecc07dbb02b45d0e7084758e9ccc44fef75a0da2882f6c432d26d8aa26cd560a
-
SSDEEP
3072:P+jFkBQKkuyW24Zs7fO52v273Y6eaN5N8qBzhmiy:WjFkBDku92cO127oKvZ4iy
Malware Config
Extracted
strrat
d4money.dynamic-dns.net:7888
d4money.dynamic-dns.net:7881
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Signatures
-
Strrat family
Files
-
90e0fb5c6cb86b7b12129108077f03b9.bin.zip
Password: infected
-
a95313d60a72e884da0432039645f13e0cdf14fc05e24e78785a4e2de8931ead.jar.jar