General

  • Target

    58827ff2fffbefadc96229e71154d5c6f3a4176e7f364e531e2a935845eebbbd.jar

  • Size

    64KB

  • Sample

    240413-bj5cfscd2t

  • MD5

    b47a6b9fed2a61efe164a130b4f55881

  • SHA1

    15e372e7e69b8b9084b9dbcb0518b3a8ae8e586b

  • SHA256

    58827ff2fffbefadc96229e71154d5c6f3a4176e7f364e531e2a935845eebbbd

  • SHA512

    8efc1894516db1dbe62efc514455252ebf103e737ff7c2bf35e9953038d378d7b571083d2cd6e0e12e9d249ba47adcf87b9ffd61e3976f38f9c5affa349722ca

  • SSDEEP

    1536:78VCTm8IlFW+TD7xIia9WCPCc/8C9icqKBDeGCMQOulVOBXTANyWc8liB:7gqboFWU7CikXlevMQOulVYTANyWc8YB

Malware Config

Extracted

Family

strrat

C2

elastsolek21.duckdns.org:4781

zekeriyasolek45.duckdns.org:4781

Attributes
  • license_id

    WFC9-W4KB-388F-9KY1-S6JV

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Targets

    • Target

      58827ff2fffbefadc96229e71154d5c6f3a4176e7f364e531e2a935845eebbbd.jar

    • Size

      64KB

    • MD5

      b47a6b9fed2a61efe164a130b4f55881

    • SHA1

      15e372e7e69b8b9084b9dbcb0518b3a8ae8e586b

    • SHA256

      58827ff2fffbefadc96229e71154d5c6f3a4176e7f364e531e2a935845eebbbd

    • SHA512

      8efc1894516db1dbe62efc514455252ebf103e737ff7c2bf35e9953038d378d7b571083d2cd6e0e12e9d249ba47adcf87b9ffd61e3976f38f9c5affa349722ca

    • SSDEEP

      1536:78VCTm8IlFW+TD7xIia9WCPCc/8C9icqKBDeGCMQOulVOBXTANyWc8liB:7gqboFWU7CikXlevMQOulVYTANyWc8YB

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks