Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

STRRAT

68
Global rank
112 infographic chevron month
Month rank
95 infographic chevron week
Week rank
0
IOCs

STRRAT is a type of malicious software known as a remote access trojan (RAT). It gives attackers the ability to gain full control over a victim's computer system, enabling them to steal confidential information, spy on their activities, and drop other malware. STRRAT has been in operation since 2020 and is regularly updated to increase its complexity and make it more difficult to detect.

RAT
Type
Unknown
Origin
1 June, 2020
First seen
5 February, 2026
Last seen

How to analyze STRRAT with ANY.RUN

RAT
Type
Unknown
Origin
1 June, 2020
First seen
5 February, 2026
Last seen

IOCs

IP addresses
79.110.62.204
193.161.193.99
194.147.140.186
37.120.199.54
69.65.7.138
37.221.114.90
185.136.159.232
178.254.7.88
194.5.97.4
172.93.201.199
194.5.98.239
185.140.53.196
91.192.100.42
185.234.216.112
176.10.104.240
23.105.131.243
23.239.31.129
185.244.30.213
164.90.144.14
185.140.53.35
Hashes
146e04ad28ceda68230c9085a4198fa74d6482760b9eaf0ad575e50c200f09cc
655954e2d7d2e71f7c2cdcfb278f9154b94a50904ee3315824de204aa14e0100
df24b51772ff4959e9bbfe481f72f0e88ba6e7c031d60edb3b1a47c69f69a6d0
Domains
harold.jetos.com
elastsolek1.duckdns.org
rstr06.ddnsking.com
giversclub.dns04.com
str04.bounceme.net
chance2021.ddns.net
str02.ddnsking.com
punisher.shacknet.us
stunted.bounceme.net
win.adds-only.xyz
install-java.myq-see.com
finishfarm.duckdns.org
networkip.duckdns.org
edonbe2189.ddns.net
rhid08.ddnsking.com
pplugin.duckdns.org
nectarclampplaza.com
str-master.pw
ngofav.hopto.org
mineqroft.publicvm.com
URLs
http://jbfrost.live/strigoi/server/
http://str-master.pw/strigoi/server/ping.php
Last Seen at
Last Seen at

Recent blog posts

post image
How Threat Intelligence Helps Protect Financi...
watchers 409
comments 0
post image
Release Notes: Workflow Improvements, MISP In...
watchers 2209
comments 0
post image
Enterprise Phishing: How Attackers Abuse Trus...
watchers 4298
comments 0

What is STRRAT malware?

STRRAT is a Java-based malware that has been active since at least mid-2020. It is intended for a number of malicious purposes, including exfiltrating data from users’ browsers and email clients, keylogging, stealing files, as well as dropping additional malware. The creators of STRRAT are unknown, yet the continued evolution of the malware suggests that the developers behind it are constantly working to improve its capabilities.

The use of Java, a language that has largely lost its popularity over the past decade, does not prevent STRRAT from infecting numerous machines across the globe every year. Although the early versions of the malware required the presence of Java Runtime Environment (JRE) on the victim’s computer, the newer ones can do without it. Instead, they scan the system and install the JRE software downloaded from one of the remote servers.

While STRRAT continues to be distributed using simple .jar files, there are also instances of weaponized .pdfs and .xlsbs. Some attackers also use the polyglot technique to spread the malware (CVE-2020-1464). Specifically, they can combine two file formats (e.g., .msi and .jar) to circumvent security systems. Such files are usually sent as attachments to emails disguised as legitimate documents, including receipts and invoices, as part of spam or phishing campaigns.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the STRRAT malicious software

Similar to other remote access trojans, such as XWorm and AsyncRAT, STRRAT enables criminals to engage in:

  • Remote control: The malware lets its operators access the PC of their victim, view the screen of the device, and even reboot it.
  • Data theft: It can be used to gather sensitive data, including passwords, credit card information, and browser history.
  • File management: The program has the capacity to extract files from different directories. It can also upload, delete, and open files.
  • Malware installation: STRRAT can drop other malicious software.
  • Webcam and microphone recording: The spying capabilities of the malware make it possible for attackers to record users’ conversations and take photos.
  • Keylogging: It can transmit all the keystrokes detected on the infected machine to its C2C server. Alternatively, it can record the information in an offline mode and transfer it once the connection is established again.

Additionally, it can act as a reverse proxy server for attackers, listen for incoming RDP connections, as well as execute cmd and PowerShell commands. The malware can download and install new updates from a remote server, allowing it to receive the latest features and capabilities, and to evade detection by antivirus software.

Another notable feature of STRRAT is its “crimson” module, which makes an attempt at encrypting victims’ files by adding the .crimson extension to them. Yet, by manually removing this extension, users can once again access their files. Basically, STRRAT poorly imitates the behavior of full-scale ransomware, such as WannaCry.

In terms of obfuscation, the latest version of the malware, namely the 1.6 one, employs two commercial obfuscators, Zelix KlassMaster (ZKM) and Allatori. One of the ways that STRRAT achieves persistence is by creating a scheduled task, masked under the name of a legitimate process such as "Skype.exe." In addition to creating a scheduled task, STRRAT also changes the autorun value and writes itself into the startup menu. This ensures that the malware will launch again after the operating system is rebooted.

STRRAT is capable of easily gaining elevated privileges on the system, which gives more power to the attacker. You can learn more about the techniques used by STRRAT by reading the article STRRAT: Malware Analysis of a JAR archive.

Execution process of STRRAT

To get a better understanding of the techniques used by the malware and collect its IOCs, STRRAT can be uploaded to the ANY.RUN interactive sandbox.

Upon execution, STRRAT drops DLL files onto the disk and initiates a persistent task that runs every 30 minutes via the task scheduler. This task spawns a new process that generates WMI queries for system information. The malware then starts a benign Windows application that serves as a launchpad for an embedded malicious payload, in this case, Formbook.

Read a detailed analysis of STRRAT in our blog.

STRRAT process tree STRRAT's process tree

Distribution methods of the STRRAT malware

Phishing email campaigns remain the go-to method for threat actors to launch attacks using STRRAT against victims. Such emails typically mimic the branding and logos of trusted organizations, making them appear legitimate.

For instance, one of the documented cases related to STRRAT involved a fake email from the MAERSK shipping company. By unknowingly downloading and opening files attached to these emails, victims can kick off a chain reaction resulting in attackers gaining full control over their computers.

Conclusion

The STRRAT malware has proven to be a persistent challenge over the past 3 years. Individual users and SMEs are the groups primarily targeted by threat actors who use this malware. This puts an emphasis on the importance of having a reliable and fast tool like ANY.RUN for scanning suspicious links and files. The service generates comprehensive reports on the behavior of any sample in seconds and provides a conclusive verdict on whether a certain file or URL is malicious or not.

Try ANY.RUN for free – request a demo!.

HAVE A LOOK AT

DarkTortilla screenshot
DarkTortilla
darktortilla
DarkTortilla is a crypter used by attackers to spread harmful software. It can modify system files to stay hidden and active. DarkTortilla is a multi-stage crypter that relies on several components to operate. It is often distributed through phishing sites that look like real services.
Read More
Oyster screenshot
Oyster
oyster
Oyster (also seen in reporting as Broomstick or CleanUpLoader) is a Windows backdoor/loader actively used in multi-stage intrusion campaigns. Recent campaigns weaponize SEO-poisoning and malvertising to trick IT and dev users into downloading trojanized installers (PuTTY, WinSCP, Microsoft Teams, etc.), which then drop Oyster to establish a persistent foothold and load additional payloads (often leading to data theft or ransomware).
Read More
WannaCry screenshot
WannaCry
wannacry ransomware
WannaCry is a famous Ransomware that utilizes the EternalBlue exploit. This malware is known for infecting at least 200,000 computers worldwide and it continues to be an active and dangerous threat.
Read More
Sliver screenshot
Sliver
sliver
Sliver is an open-source command-and-control (C2) framework that has been increasingly adopted by threat actors as an alternative to tools like Cobalt Strike. Developed by security firm Bishop Fox, Sliver was initially intended for legitimate security testing and red teaming exercises. However, its robust features and open-source nature have made it attractive to malicious actors seeking to control compromised systems.
Read More
DEVMAN screenshot
DEVMAN
devman
DEVMAN is a fast-evolving malware family targeting Windows environments with a mix of credential theft, remote control capabilities, and persistence techniques typical of modern crimeware. Initially observed in early 2025, DEVMAN quickly became a favorite tool among cybercriminal groups thanks to its stealth, modular structure, and ability to bypass traditional AV solutions.
Read More
RedLine screenshot
RedLine
redline stealer redline stealer malware
RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.
Read More