General
-
Target
20122024_0920_19122024_MBF-667548.jar
-
Size
202KB
-
Sample
241220-lasmeavqcj
-
MD5
343aff03f4582c780ce776fd6a794aa9
-
SHA1
0901376c44403e0c4c15955628831fdb38e071e4
-
SHA256
b7e88ae109f765c4456e0e3239e5b565908caf87c9cae4fb54d48921e8645766
-
SHA512
64650c28c23d23b8549f783303d87284adcc7ffc038a93a3ac2856b48adc6e003e320565526978f52ba3fad4c75fb6ab8a76281f28df6616ece83757842ac04b
-
SSDEEP
6144:4epoWhEq3+wIZZo4JKNqgbV6uDUFe7N7P:Kvq5IZZ7Cq7Pej
Behavioral task
behavioral1
Sample
20122024_0920_19122024_MBF-667548.jar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
20122024_0920_19122024_MBF-667548.jar
Resource
win10v2004-20241007-en
Malware Config
Extracted
strrat
157.230.51.65:9088
127.0.0.1:0
-
license_id
MURM-QLUY-XVDU-NZ0K-0AAB
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
20122024_0920_19122024_MBF-667548.jar
-
Size
202KB
-
MD5
343aff03f4582c780ce776fd6a794aa9
-
SHA1
0901376c44403e0c4c15955628831fdb38e071e4
-
SHA256
b7e88ae109f765c4456e0e3239e5b565908caf87c9cae4fb54d48921e8645766
-
SHA512
64650c28c23d23b8549f783303d87284adcc7ffc038a93a3ac2856b48adc6e003e320565526978f52ba3fad4c75fb6ab8a76281f28df6616ece83757842ac04b
-
SSDEEP
6144:4epoWhEq3+wIZZo4JKNqgbV6uDUFe7N7P:Kvq5IZZ7Cq7Pej
Score10/10-
Strrat family
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1