Behavioral task
behavioral1
Sample
4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c.jar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c.jar
Resource
win10v2004-20240802-en
General
-
Target
a0dd28721c980f00fe5b3952447a5940db9fd2f9235f94a09f0741549f0c88e1
-
Size
64KB
-
MD5
e7dab1bc0d83cd8849ff04dcb6e35363
-
SHA1
b5b99436683d3dfa6201d3ae20d32495141b50db
-
SHA256
a0dd28721c980f00fe5b3952447a5940db9fd2f9235f94a09f0741549f0c88e1
-
SHA512
9c423d207a05fbd4ed40eaa104c646b3bf67df3c76898fb568ef197158866e0cbb0691b088a99e54cf8a063267ebce8aa30a5a83f64ea74b616d2c004c650cd5
-
SSDEEP
1536:tkestGnbLsy+QLinXtn/L1gQ5pT2c7MAyb410Vj:tsEbLP++Sd/CMSzAyb4iVj
Malware Config
Extracted
strrat
elastsolek1.duckdns.org:4787
zekeriyasolek45.duckdns.org:4787
-
license_id
WFC9-W4KB-388F-9KY1-S6JV
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Signatures
-
Strrat family
Files
-
a0dd28721c980f00fe5b3952447a5940db9fd2f9235f94a09f0741549f0c88e1.zip
Password: infected
-
4005216ddf9e092bddda8a78f0babe94746632ef6a64793e1fa0e94f1538a49c.jar.jar