General
-
Target
ee75fce2158c3587daa560419f122001.bin
-
Size
102KB
-
Sample
240331-cfehascd24
-
MD5
d1ab3f022504e0d136bed85d08a52303
-
SHA1
b870f90ecbd1faa72913cfb19acfaec5435acb8d
-
SHA256
c2d10428fe726b860c13a6ca540bbfa471f7938d32f841422d21472c41871e3a
-
SHA512
a5a2cd0b2e0782d80bfe9bc42e8c153d17cbbe11806a595676ff54a628a87b3e23a53f4c6567e7809dab7d19034b43e97b3059735dc8016aadbebf43d8f45962
-
SSDEEP
3072:rzY0j2S3MFDOxBAqQXOjOqRU0vA/lkvYRgAbGo/BXkmYTaLOYvgI9:/HuDOxBJc3yA9yNcz5eW6Yvb9
Behavioral task
behavioral1
Sample
88a9b4cfac5ba3a433942f8f4e489229f0fd694a7f9a78a8b6ca5cc5dc590e00.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88a9b4cfac5ba3a433942f8f4e489229f0fd694a7f9a78a8b6ca5cc5dc590e00.jar
Resource
win10v2004-20240226-en
Malware Config
Extracted
strrat
d4money.dynamic-dns.net:7888
d4money.dynamic-dns.net:7881
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
88a9b4cfac5ba3a433942f8f4e489229f0fd694a7f9a78a8b6ca5cc5dc590e00.jar
-
Size
109KB
-
MD5
ee75fce2158c3587daa560419f122001
-
SHA1
760d09adceeb4903db4130ef0d28654915844d5d
-
SHA256
88a9b4cfac5ba3a433942f8f4e489229f0fd694a7f9a78a8b6ca5cc5dc590e00
-
SHA512
c1a4ce9bf70ced9adee8f2955573e65777bc3e4151dacca076502cbd8cb8af9ceb5735cfed73e2bb9d8617961a3862ef94f440d25ab9f948407705b1a88d4229
-
SSDEEP
3072:QOOwYuveeNu/6Xy8HZknOZ6Xdbx9kkTrxZKXZnmVOEvIT:KwdveeoiXy8Cny6Nbx9nrxZKJtEvS
Score7/10-
Modifies file permissions
-