General

  • Target

    5d16505a5abfcfc99095a676f1f0bd64.jar

  • Size

    64KB

  • Sample

    240428-vb858acd71

  • MD5

    5d16505a5abfcfc99095a676f1f0bd64

  • SHA1

    facfb1f1014ba5f8c8618678a1a9a7f5bf5c35e5

  • SHA256

    39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d

  • SHA512

    a49885eb60f6429c1247ae44bcf806836031a7191078a3b14b47c26b577bd2824d64ab17df8244361e114235600043188eae2794f58f299094976682865dc2cb

  • SSDEEP

    1536:UNWRlwUsz/P+zKG2X2CWYqLvSUWD+YBFBbOl+H/Zm:UNisz/6YriYFfH/Zm

Malware Config

Extracted

Family

strrat

C2

elastsolek21.duckdns.org:4781

zekeriyasolek45.duckdns.org:4781

Attributes
  • license_id

    WFC9-W4KB-388F-9KY1-S6JV

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Targets

    • Target

      5d16505a5abfcfc99095a676f1f0bd64.jar

    • Size

      64KB

    • MD5

      5d16505a5abfcfc99095a676f1f0bd64

    • SHA1

      facfb1f1014ba5f8c8618678a1a9a7f5bf5c35e5

    • SHA256

      39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d

    • SHA512

      a49885eb60f6429c1247ae44bcf806836031a7191078a3b14b47c26b577bd2824d64ab17df8244361e114235600043188eae2794f58f299094976682865dc2cb

    • SSDEEP

      1536:UNWRlwUsz/P+zKG2X2CWYqLvSUWD+YBFBbOl+H/Zm:UNisz/6YriYFfH/Zm

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks