General
-
Target
9c3abdcc93fb3e179e4ea80afd21df14b6a6f7b23669cef03de2741fb0c0485b.jar
-
Size
64KB
-
Sample
240320-czt24aef69
-
MD5
1437058c6d28f9a7a3ccdeaceda607bd
-
SHA1
5d7b2f57c74739f8e077dafd25964ef3f990b0ca
-
SHA256
9c3abdcc93fb3e179e4ea80afd21df14b6a6f7b23669cef03de2741fb0c0485b
-
SHA512
835b0a988b39f0615d5a7d06a980e26cab4eae567aaa7b5636e076a89e12b132b3def781b891fedfb434844f2348cbe89ae0ead8c014b3f1e02b21628a4d7ef9
-
SSDEEP
1536:fs4vu4cVMHH4/o0oJ4pxtOPLYr/09xIYd3W4Un:fXuMHY/JhtOPLYey4Un
Behavioral task
behavioral1
Sample
9c3abdcc93fb3e179e4ea80afd21df14b6a6f7b23669cef03de2741fb0c0485b.jar
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9c3abdcc93fb3e179e4ea80afd21df14b6a6f7b23669cef03de2741fb0c0485b.jar
Resource
win10v2004-20240226-en
Malware Config
Extracted
strrat
elastsolek21.duckdns.org:4781
zekeriyasolek45.duckdns.org:4781
-
license_id
WFC9-W4KB-388F-9KY1-S6JV
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
9c3abdcc93fb3e179e4ea80afd21df14b6a6f7b23669cef03de2741fb0c0485b.jar
-
Size
64KB
-
MD5
1437058c6d28f9a7a3ccdeaceda607bd
-
SHA1
5d7b2f57c74739f8e077dafd25964ef3f990b0ca
-
SHA256
9c3abdcc93fb3e179e4ea80afd21df14b6a6f7b23669cef03de2741fb0c0485b
-
SHA512
835b0a988b39f0615d5a7d06a980e26cab4eae567aaa7b5636e076a89e12b132b3def781b891fedfb434844f2348cbe89ae0ead8c014b3f1e02b21628a4d7ef9
-
SSDEEP
1536:fs4vu4cVMHH4/o0oJ4pxtOPLYr/09xIYd3W4Un:fXuMHY/JhtOPLYey4Un
Score10/10-
Detects files packed with Allatori Java Obfuscator
-
Drops startup file
-
Modifies file permissions
-
Adds Run key to start application
-