General
-
Target
ORDER #256988PDF.js
-
Size
955KB
-
Sample
250214-gw5rmsvlhp
-
MD5
a8d8c8f8213370e298e4c51777b5ca6f
-
SHA1
e7154be7f1ece7adb9a1bda5a76023890911f26c
-
SHA256
77bc548441266a989e02d2699c1ee2b6d6dd9254a20dabbb7ab14ce8a2df4c06
-
SHA512
8336c930cd80b4e1c890ab5201d5b482bff71b5d4309a1a85b032570b9e39d93389ee07537bff58b58978bf0492c40499505074cb6ce99640ecd2d5d8b3b48e8
-
SSDEEP
6144:w4j8E7KdksEmXpivANu3xQ2ZFnNsa9eX44HQfYEhrn9KXXUa14VcEvb6EcB7QTkD:5wezANwdJsa9q4tNVngYABHD
Static task
static1
Behavioral task
behavioral1
Sample
ORDER #256988PDF.js
Resource
win7-20240903-en
Malware Config
Extracted
strrat
chongmei33.publicvm.com:44662
chongmei33.myddns.rocks:44662
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Targets
-
-
Target
ORDER #256988PDF.js
-
Size
955KB
-
MD5
a8d8c8f8213370e298e4c51777b5ca6f
-
SHA1
e7154be7f1ece7adb9a1bda5a76023890911f26c
-
SHA256
77bc548441266a989e02d2699c1ee2b6d6dd9254a20dabbb7ab14ce8a2df4c06
-
SHA512
8336c930cd80b4e1c890ab5201d5b482bff71b5d4309a1a85b032570b9e39d93389ee07537bff58b58978bf0492c40499505074cb6ce99640ecd2d5d8b3b48e8
-
SSDEEP
6144:w4j8E7KdksEmXpivANu3xQ2ZFnNsa9eX44HQfYEhrn9KXXUa14VcEvb6EcB7QTkD:5wezANwdJsa9q4tNVngYABHD
-
Strrat family
-
Wshrat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1