General
-
Target
11f48863ce899743c5276b47296e3ba355b3974f1b22401c6c1d90a8ec81321c.jar
-
Size
264KB
-
Sample
241120-pzl3pswgrb
-
MD5
c352ec9211111d441cb54b9a1d92b935
-
SHA1
e0e83f76c30bf60162aae7fad9284312d17ee3d7
-
SHA256
11f48863ce899743c5276b47296e3ba355b3974f1b22401c6c1d90a8ec81321c
-
SHA512
236fc61d57974d67332577485383179ab6a07738291accbf834d3363ebb64f4d82ae1a349252d6e9a92f1bbd7d42f4a3e5c3efb03b4df0de29068c4ca3ebfa14
-
SSDEEP
3072:3XkmV3rTQMDIapc+5rNlrL2Wplyvld2ec3B9Akzr4g7lyTlv+w05fpozRHs9UATH:39V3QMLqqvSorTlUlvPosHsTTH
Behavioral task
behavioral1
Sample
11f48863ce899743c5276b47296e3ba355b3974f1b22401c6c1d90a8ec81321c.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11f48863ce899743c5276b47296e3ba355b3974f1b22401c6c1d90a8ec81321c.jar
Resource
win10v2004-20241007-en
Malware Config
Extracted
strrat
badmiles.ddns.net:5055
-
license_id
4OI0-V4TA-Z8G4-WQF1-B9VH
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
11f48863ce899743c5276b47296e3ba355b3974f1b22401c6c1d90a8ec81321c.jar
-
Size
264KB
-
MD5
c352ec9211111d441cb54b9a1d92b935
-
SHA1
e0e83f76c30bf60162aae7fad9284312d17ee3d7
-
SHA256
11f48863ce899743c5276b47296e3ba355b3974f1b22401c6c1d90a8ec81321c
-
SHA512
236fc61d57974d67332577485383179ab6a07738291accbf834d3363ebb64f4d82ae1a349252d6e9a92f1bbd7d42f4a3e5c3efb03b4df0de29068c4ca3ebfa14
-
SSDEEP
3072:3XkmV3rTQMDIapc+5rNlrL2Wplyvld2ec3B9Akzr4g7lyTlv+w05fpozRHs9UATH:39V3QMLqqvSorTlUlvPosHsTTH
Score10/10-
Strrat family
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1