General

  • Target

    0x0009000000016ea4-41.dat

  • Size

    92KB

  • Sample

    240927-fvmc8swgrk

  • MD5

    105a14c6fce083e80f49b30db88ec915

  • SHA1

    46187697a87562210e785917ce6ca16aeb4912b3

  • SHA256

    7e5adae008afee158168b1943fcc41157c7de63ab4792cc5eba8d1830edd6d65

  • SHA512

    2322eeeb100b644d53641ec3c1b0588579565636a2ea934924931f6f77b156b6d4e5925a2f36b0520e1f568d771860af53e9f3c39bb5238f7e7520389692c963

  • SSDEEP

    1536:gmC/f1AjIP1h9QB1+j6kc9lnGSmPsEkb0+pLyejZTpTZhe9JqHGvmvxXpCHrIr6:vCqjIP1fQOjsGvPhkg+9ye1T09JjvbLF

Malware Config

Extracted

Family

strrat

C2

93.185.156.124:1912

127.0.0.1:1912

Attributes
  • license_id

    khonsari

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Targets

    • Target

      0x0009000000016ea4-41.dat

    • Size

      92KB

    • MD5

      105a14c6fce083e80f49b30db88ec915

    • SHA1

      46187697a87562210e785917ce6ca16aeb4912b3

    • SHA256

      7e5adae008afee158168b1943fcc41157c7de63ab4792cc5eba8d1830edd6d65

    • SHA512

      2322eeeb100b644d53641ec3c1b0588579565636a2ea934924931f6f77b156b6d4e5925a2f36b0520e1f568d771860af53e9f3c39bb5238f7e7520389692c963

    • SSDEEP

      1536:gmC/f1AjIP1h9QB1+j6kc9lnGSmPsEkb0+pLyejZTpTZhe9JqHGvmvxXpCHrIr6:vCqjIP1fQOjsGvPhkg+9ye1T09JjvbLF

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Drops startup file

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks