General
-
Target
TT Payment.jar
-
Size
267KB
-
Sample
250210-gyapaasnam
-
MD5
b4bc577b9b011c29d04f7e3797f5b4c0
-
SHA1
dd5f810d906cd61a8ec78c28841a121fbaa88d6f
-
SHA256
fe02be2dc318367898f962aa9c3415ff96d95526aa6f6efd72764a732f3b745c
-
SHA512
12eba3aacb580eaf11dc9a9aec39ad5e926d053fc8e6fb6871153e22bfb2627628a64f3e931855ff772e63bb152862b7c59292345489085068e8e5c3263ecfa4
-
SSDEEP
3072:fIMXATbZOaBKsPUVx4lboHQMg5CBklnIVSPxk/ISc6iTpoP6vBum4ggH9AoGa+:gAATbZiDPPqlISPW/IlFg6ZuZ+a+
Behavioral task
behavioral1
Sample
TT Payment.jar
Resource
win10ltsc2021-20250207-en
Malware Config
Extracted
strrat
195.211.190.213:1663
-
license_id
WYAA-QBJT-QQ16-FF21-N4O2
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Targets
-
-
Target
TT Payment.jar
-
Size
267KB
-
MD5
b4bc577b9b011c29d04f7e3797f5b4c0
-
SHA1
dd5f810d906cd61a8ec78c28841a121fbaa88d6f
-
SHA256
fe02be2dc318367898f962aa9c3415ff96d95526aa6f6efd72764a732f3b745c
-
SHA512
12eba3aacb580eaf11dc9a9aec39ad5e926d053fc8e6fb6871153e22bfb2627628a64f3e931855ff772e63bb152862b7c59292345489085068e8e5c3263ecfa4
-
SSDEEP
3072:fIMXATbZOaBKsPUVx4lboHQMg5CBklnIVSPxk/ISc6iTpoP6vBum4ggH9AoGa+:gAATbZiDPPqlISPW/IlFg6ZuZ+a+
Score10/10-
Strrat family
-
Downloads MZ/PE file
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1