General

  • Target

    Invoice.jar

  • Size

    107KB

  • Sample

    211029-fs5f2ahcgn

  • MD5

    42a070b16c237002f30bbfadf2b13c63

  • SHA1

    b95cf7fa6d96d91311f6f92489ec1f390a2b21b7

  • SHA256

    773bcb60bf648c733c1b737b38a55b2dd952f14e6099967a30306c94efba65bb

  • SHA512

    f24ed3c7132fc4f59eac6a05d085b928ce199927acac76a3ee37e14b569e19e68e079b9aa9e4c6851cfcc6e221b93a5e121bf0ef0ca6a2216660766c498162ef

Malware Config

Targets

    • Target

      Invoice.jar

    • Size

      107KB

    • MD5

      42a070b16c237002f30bbfadf2b13c63

    • SHA1

      b95cf7fa6d96d91311f6f92489ec1f390a2b21b7

    • SHA256

      773bcb60bf648c733c1b737b38a55b2dd952f14e6099967a30306c94efba65bb

    • SHA512

      f24ed3c7132fc4f59eac6a05d085b928ce199927acac76a3ee37e14b569e19e68e079b9aa9e4c6851cfcc6e221b93a5e121bf0ef0ca6a2216660766c498162ef

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • suricata: ET MALWARE STRRAT CnC Checkin

      suricata: ET MALWARE STRRAT CnC Checkin

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks