General
-
Target
0x0009000000016ea4-41.dat
-
Size
92KB
-
Sample
240927-fvmc8swgrk
-
MD5
105a14c6fce083e80f49b30db88ec915
-
SHA1
46187697a87562210e785917ce6ca16aeb4912b3
-
SHA256
7e5adae008afee158168b1943fcc41157c7de63ab4792cc5eba8d1830edd6d65
-
SHA512
2322eeeb100b644d53641ec3c1b0588579565636a2ea934924931f6f77b156b6d4e5925a2f36b0520e1f568d771860af53e9f3c39bb5238f7e7520389692c963
-
SSDEEP
1536:gmC/f1AjIP1h9QB1+j6kc9lnGSmPsEkb0+pLyejZTpTZhe9JqHGvmvxXpCHrIr6:vCqjIP1fQOjsGvPhkg+9ye1T09JjvbLF
Behavioral task
behavioral1
Sample
0x0009000000016ea4-41.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0x0009000000016ea4-41.jar
Resource
win10v2004-20240802-en
Malware Config
Extracted
strrat
93.185.156.124:1912
127.0.0.1:1912
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
0x0009000000016ea4-41.dat
-
Size
92KB
-
MD5
105a14c6fce083e80f49b30db88ec915
-
SHA1
46187697a87562210e785917ce6ca16aeb4912b3
-
SHA256
7e5adae008afee158168b1943fcc41157c7de63ab4792cc5eba8d1830edd6d65
-
SHA512
2322eeeb100b644d53641ec3c1b0588579565636a2ea934924931f6f77b156b6d4e5925a2f36b0520e1f568d771860af53e9f3c39bb5238f7e7520389692c963
-
SSDEEP
1536:gmC/f1AjIP1h9QB1+j6kc9lnGSmPsEkb0+pLyejZTpTZhe9JqHGvmvxXpCHrIr6:vCqjIP1fQOjsGvPhkg+9ye1T09JjvbLF
Score10/10-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1