General
-
Target
39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d
-
Size
64KB
-
Sample
240428-vbge7scb78
-
MD5
5d16505a5abfcfc99095a676f1f0bd64
-
SHA1
facfb1f1014ba5f8c8618678a1a9a7f5bf5c35e5
-
SHA256
39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d
-
SHA512
a49885eb60f6429c1247ae44bcf806836031a7191078a3b14b47c26b577bd2824d64ab17df8244361e114235600043188eae2794f58f299094976682865dc2cb
-
SSDEEP
1536:UNWRlwUsz/P+zKG2X2CWYqLvSUWD+YBFBbOl+H/Zm:UNisz/6YriYFfH/Zm
Behavioral task
behavioral1
Sample
39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar
Resource
win11-20240419-en
Malware Config
Extracted
strrat
elastsolek21.duckdns.org:4781
zekeriyasolek45.duckdns.org:4781
-
license_id
WFC9-W4KB-388F-9KY1-S6JV
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d
-
Size
64KB
-
MD5
5d16505a5abfcfc99095a676f1f0bd64
-
SHA1
facfb1f1014ba5f8c8618678a1a9a7f5bf5c35e5
-
SHA256
39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d
-
SHA512
a49885eb60f6429c1247ae44bcf806836031a7191078a3b14b47c26b577bd2824d64ab17df8244361e114235600043188eae2794f58f299094976682865dc2cb
-
SSDEEP
1536:UNWRlwUsz/P+zKG2X2CWYqLvSUWD+YBFBbOl+H/Zm:UNisz/6YriYFfH/Zm
Score10/10-
Drops startup file
-
Modifies file permissions
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-