General

  • Target

    Remittance E-MAIL Layout _ 12_.jar

  • Size

    105KB

  • Sample

    210519-wl33pjpskj

  • MD5

    e2d8f5bdf7e52f80c4d9994a0614cfad

  • SHA1

    7586653e324696781f4b8e19f5a008b9e7b74150

  • SHA256

    94128ae9a78c975a33e9a3e84022f582332a55ba2ae9ccec22c2b28a85730a97

  • SHA512

    510671a333be370e5bb2026048b00fa8782300046f89af33e11537a4bb7b9a17eb07186837cad570e8969cda27acc1741114ef5c9d7c5b8e1c3d367f9447b192

Malware Config

Targets

    • Target

      Remittance E-MAIL Layout _ 12_.jar

    • Size

      105KB

    • MD5

      e2d8f5bdf7e52f80c4d9994a0614cfad

    • SHA1

      7586653e324696781f4b8e19f5a008b9e7b74150

    • SHA256

      94128ae9a78c975a33e9a3e84022f582332a55ba2ae9ccec22c2b28a85730a97

    • SHA512

      510671a333be370e5bb2026048b00fa8782300046f89af33e11537a4bb7b9a17eb07186837cad570e8969cda27acc1741114ef5c9d7c5b8e1c3d367f9447b192

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Executes dropped EXE

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks