General
-
Target
25072024_0634_duty1.jar
-
Size
202KB
-
Sample
240725-hb9erstdpr
-
MD5
482bd2427eaf1fe50697919c6741ae82
-
SHA1
28f52c11312a36688d8e56cbfada4d9983efa1fb
-
SHA256
f8e4c56ef49ada4ef559292bada86a85db5b4a924ed1cb593c72f32655af3e66
-
SHA512
77c7b0fcb1ba3061546f6f12af1b1cb4f1195f92a8f4aa1454eb482e4a9ea315d51dc7edf075b240d7f8b650a4ce7cad8c426f57406d27d8f7518abfea570191
-
SSDEEP
6144:EWPeWfEqDo2s3Jm+7UNkEbVmoDU/U37Pa:6Rqls3JHCkrfai
Behavioral task
behavioral1
Sample
25072024_0634_duty1.jar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
25072024_0634_duty1.jar
Resource
win10v2004-20240704-en
Malware Config
Extracted
strrat
94.156.68.149:1616
-
license_id
LY6A-TUCK-H5Q0-C3NO-6XHG
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
25072024_0634_duty1.jar
-
Size
202KB
-
MD5
482bd2427eaf1fe50697919c6741ae82
-
SHA1
28f52c11312a36688d8e56cbfada4d9983efa1fb
-
SHA256
f8e4c56ef49ada4ef559292bada86a85db5b4a924ed1cb593c72f32655af3e66
-
SHA512
77c7b0fcb1ba3061546f6f12af1b1cb4f1195f92a8f4aa1454eb482e4a9ea315d51dc7edf075b240d7f8b650a4ce7cad8c426f57406d27d8f7518abfea570191
-
SSDEEP
6144:EWPeWfEqDo2s3Jm+7UNkEbVmoDU/U37Pa:6Rqls3JHCkrfai
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1