General

  • Target

    f40d70bde7f57edd7e0fa6b262f8d00a00bcdbc6e3bd96eda0ef713639666764.jar

  • Size

    270KB

  • Sample

    241218-h9h1gayrew

  • MD5

    d5cf4a088cd40a7f4596f214f9b5cdb7

  • SHA1

    a3501de00888ceaf251b0b8846d219782ebf4521

  • SHA256

    f40d70bde7f57edd7e0fa6b262f8d00a00bcdbc6e3bd96eda0ef713639666764

  • SHA512

    8a122a2adf4bc4af81c630539cf2843c7e34fe7c92fec4c5d1e920dd5da2e7a62e981dd88e40a0d2cc27049db8ea7e4a5c41c986ab64d37488e41de2d8bf7a50

  • SSDEEP

    6144:ZKsFo4SYx6gHoUybvlMgSnvyuc69/LEmXF3:wsFoNYxJGMgSnVh9LEmt

Malware Config

Extracted

Family

strrat

C2

evilginx.misecure.com:1790

Attributes
  • license_id

    RKA0-KES0-EPPK-UDRO-JNCG

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Targets

    • Target

      f40d70bde7f57edd7e0fa6b262f8d00a00bcdbc6e3bd96eda0ef713639666764.jar

    • Size

      270KB

    • MD5

      d5cf4a088cd40a7f4596f214f9b5cdb7

    • SHA1

      a3501de00888ceaf251b0b8846d219782ebf4521

    • SHA256

      f40d70bde7f57edd7e0fa6b262f8d00a00bcdbc6e3bd96eda0ef713639666764

    • SHA512

      8a122a2adf4bc4af81c630539cf2843c7e34fe7c92fec4c5d1e920dd5da2e7a62e981dd88e40a0d2cc27049db8ea7e4a5c41c986ab64d37488e41de2d8bf7a50

    • SSDEEP

      6144:ZKsFo4SYx6gHoUybvlMgSnvyuc69/LEmXF3:wsFoNYxJGMgSnVh9LEmt

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Strrat family

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks