General

  • Target

    MDE_File_Sample_ee559cc3e69ca0c429d13576e086e2dcba323332.zip

  • Size

    62KB

  • Sample

    250103-lv3ccazrdm

  • MD5

    86e4b02ef5a7e8cb6ac9834fe09cfb48

  • SHA1

    fcbe8edbcc90a9b0f89f12b92cf2fec3ac9bc907

  • SHA256

    423014eff22c413aa26c766bc4e18fb8dddfca3329e6b99fb238050c36aca952

  • SHA512

    be15bee585aa96295f61842e3f5432552410b8096255f8d9c2e9169aa666c818451b47f2daccf35325dfcfcc4695ad78794631b6202c9246cb6eac6ec74b64b2

  • SSDEEP

    1536:sfzqZYgDK0UoEuNeafbP6VBoUlK97q7aGwH6zK8tQV+Rp:sfzsYgmoEXbrcG7aHl8tw+b

Malware Config

Extracted

Family

strrat

C2

elastsolek21.duckdns.org:4781

zekeriyasolek45.duckdns.org:4781

Attributes
  • license_id

    WFC9-W4KB-388F-9KY1-S6JV

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Targets

    • Target

      TEKLIF-ISTEME.jar

    • Size

      64KB

    • MD5

      2dc3ec1f2b21887d14f66045a1bf312f

    • SHA1

      ee559cc3e69ca0c429d13576e086e2dcba323332

    • SHA256

      361868581afd0fa1eaed8c46990eee5074342033dc26ace69eb0e5eb72876d43

    • SHA512

      d68443266a0e5ef08fcd72d8bf0cdd3d17914f57c6fbd37e0eaf648b4dff406c4c2e55a3b2daa6dbeddc9ad656971b3dbb0b635caff65d9d28c60ea986682812

    • SSDEEP

      1536:S59vZVcVMHH45oJxm4UxtOPLpMy09xHrd3W4UB:SjZnHY5IctOPLpU04UB

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Strrat family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks