General
-
Target
461d7bbff67fa45958735a68976e83143b072eb35f2275086e99212d8fd165cb.zip
-
Size
454KB
-
Sample
241004-sylbkasank
-
MD5
f9143fb2b67492af0ea1020bcf7a019e
-
SHA1
dde2293d2f155210caedeeee321463d541d884a1
-
SHA256
51e912dd2285ec623b00678344a6b3ba933e244938fd1470a03d536cbff66a38
-
SHA512
f9f918abe5b58e13e04b07b83185dda672dda9b9097902311dc00b8de15f3b1b86d584068c2e7405040e8da3d757309761137ec35557edf32e34312d66b39f40
-
SSDEEP
12288:1XR+LRKYJLu4UsjfrT7y9E8oNw6mYGjrQayhyHwA:1XR+LRKuq6XT4D6wjrEUQA
Static task
static1
Behavioral task
behavioral1
Sample
461d7bbff67fa45958735a68976e83143b072eb35f2275086e99212d8fd165cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
461d7bbff67fa45958735a68976e83143b072eb35f2275086e99212d8fd165cb.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
strrat
93.185.156.124:1912
127.0.0.1:1912
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
461d7bbff67fa45958735a68976e83143b072eb35f2275086e99212d8fd165cb.exe
-
Size
480KB
-
MD5
aac338140e178a3cac423d3454cc7467
-
SHA1
a9c195e15b4109d4ece1309fb4e3b3bd77145421
-
SHA256
461d7bbff67fa45958735a68976e83143b072eb35f2275086e99212d8fd165cb
-
SHA512
a96b2c8c985feccbc385a8ba1e7583be6913db7da15244b136c203f7ca320a03727425f3927c21157eae0c4da3fbbdd8fb71373655c6824544296ec66df834f2
-
SSDEEP
12288:PkQNy5kuH2lZ6r4os6WQMiyvtJMDiXxJfrJyru:XvuHTr4J7Qw1JJXxJ0ru
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1