General

  • Target

    00f48539744ca9aae42100955b85b4bcdc82c0dd544268bbe946f64ca73eb478

  • Size

    198KB

  • MD5

    6b1bc657ac9fb18e18e9672b910a83f1

  • SHA1

    e9c56086e6e9085966490649283e20fa7f87e073

  • SHA256

    00f48539744ca9aae42100955b85b4bcdc82c0dd544268bbe946f64ca73eb478

  • SHA512

    48e47e3ebdd7b19fc3fcb9477de6e680caaed40d324d7065302fd2ba48eeb32100ad4078d3450d6f87645ddf264c97e6f7d4137f212172ae7efb010b6045a60a

  • SSDEEP

    3072:JWCdpqB9dOap4GjZeBHTPJpm8i0IulJvJdPuErPpaevNZGTBhOQ9m29:JLgB9dZ4GjqHz/D/BdPtcaQ9m29

Score
10/10

Malware Config

Extracted

Family

strrat

C2

chongmei33.publicvm.com:44662

jinvestments.duckdns.org:44662

Attributes
  • license_id

    khonsari

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    false

  • secondary_startup

    false

  • startup

    false

Signatures

Files

  • 00f48539744ca9aae42100955b85b4bcdc82c0dd544268bbe946f64ca73eb478
    .rar
  • ORDER-24121645908FC.jar
    .jar
  • Order.xlsx
    .xlsx office2007