General
-
Target
ddaffd1e47777bd6ee6f1d89f80dbddb.bin
-
Size
64KB
-
Sample
240831-cbpgpszbrq
-
MD5
e7dab1bc0d83cd8849ff04dcb6e35363
-
SHA1
b5b99436683d3dfa6201d3ae20d32495141b50db
-
SHA256
a0dd28721c980f00fe5b3952447a5940db9fd2f9235f94a09f0741549f0c88e1
-
SHA512
9c423d207a05fbd4ed40eaa104c646b3bf67df3c76898fb568ef197158866e0cbb0691b088a99e54cf8a063267ebce8aa30a5a83f64ea74b616d2c004c650cd5
-
SSDEEP
1536:tkestGnbLsy+QLinXtn/L1gQ5pT2c7MAyb410Vj:tsEbLP++Sd/CMSzAyb4iVj
Behavioral task
behavioral1
Sample
4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c.jar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c.jar
Resource
win10v2004-20240802-en
Malware Config
Extracted
strrat
elastsolek1.duckdns.org:4787
zekeriyasolek45.duckdns.org:4787
-
license_id
WFC9-W4KB-388F-9KY1-S6JV
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c.jar
-
Size
84KB
-
MD5
ddaffd1e47777bd6ee6f1d89f80dbddb
-
SHA1
66c0dd7372365df8546b63d98f8c2c4eb0759429
-
SHA256
4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c
-
SHA512
3fa34856f71640e635b75c1e8365db43f60d164f7122fce6612cf1d22d9ee9ddd9e8fd493076dcc69a5348a6a5d4db345fdbb869716905cb679210b12ba00060
-
SSDEEP
1536:dVu6KIkej8xhZfQk7A0eSaNa650oIDZaQx2fCRMiMUTBEbY4dTe46gX+LFSnUhru:j2r1fH7A0dT6HFfCi
Score10/10-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1