General

  • Target

    a0dd28721c980f00fe5b3952447a5940db9fd2f9235f94a09f0741549f0c88e1

  • Size

    64KB

  • MD5

    e7dab1bc0d83cd8849ff04dcb6e35363

  • SHA1

    b5b99436683d3dfa6201d3ae20d32495141b50db

  • SHA256

    a0dd28721c980f00fe5b3952447a5940db9fd2f9235f94a09f0741549f0c88e1

  • SHA512

    9c423d207a05fbd4ed40eaa104c646b3bf67df3c76898fb568ef197158866e0cbb0691b088a99e54cf8a063267ebce8aa30a5a83f64ea74b616d2c004c650cd5

  • SSDEEP

    1536:tkestGnbLsy+QLinXtn/L1gQ5pT2c7MAyb410Vj:tsEbLP++Sd/CMSzAyb4iVj

Score
10/10

Malware Config

Extracted

Family

strrat

C2

elastsolek1.duckdns.org:4787

zekeriyasolek45.duckdns.org:4787

Attributes
  • license_id

    WFC9-W4KB-388F-9KY1-S6JV

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Signatures

Files

  • a0dd28721c980f00fe5b3952447a5940db9fd2f9235f94a09f0741549f0c88e1
    .zip

    Password: infected

  • 4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c.jar
    .jar