Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now

STRRAT

60
Global rank
68 infographic chevron month
Month rank
55 infographic chevron week
Week rank
0
IOCs

STRRAT is a type of malicious software known as a remote access trojan (RAT). It gives attackers the ability to gain full control over a victim's computer system, enabling them to steal confidential information, spy on their activities, and drop other malware. STRRAT has been in operation since 2020 and is regularly updated to increase its complexity and make it more difficult to detect.

RAT
Type
Unknown
Origin
1 June, 2020
First seen
21 December, 2024
Last seen

How to analyze STRRAT with ANY.RUN

RAT
Type
Unknown
Origin
1 June, 2020
First seen
21 December, 2024
Last seen

IOCs

IP addresses
79.110.62.204
147.185.221.20
46.246.6.66
193.161.193.99
46.246.82.66
79.134.225.22
212.193.30.230
45.128.36.178
185.140.53.131
79.134.225.17
185.140.53.68
79.134.225.79
79.134.225.52
147.185.221.21
46.246.6.13
37.0.14.195
91.193.75.135
45.139.105.174
45.95.169.162
87.121.86.8
Domains
jareyo.duckdns.org
jinvestments.duckdns.org
evilginx.misecure.com
rookfellas.mrbasic.com
dogface.casacam.com
judhglaq.gleeze.com
exhibitormails.onmypc.biz
ayokoloran.com
bl01223.itsaol.com
oluwashowmercy.hopto.org
prtoacasedted.3utilities.com
otcworldmedia.com
intertradez.com
50kteam.dynamic-dns.net
tryranjav.ydns.eu
lestencrypt.info
street-img.ddns.net
macostopacros.3utilities.com
giveandtake.mefound.com
crytpus.dynamic-dns.net
URLs
http://jbfrost.live/strigoi/server/
http://str-master.pw/strigoi/server/ping.php
Last Seen at

Recent blog posts

post image
Well done, ANY.RUN: Our Top Cybersecurity Awa...
watchers 217
comments 0
post image
How DFIR Analysts Use ANY.RUN Sandbox
watchers 311
comments 0
post image
How to Set up a Windows 11 Malware Sandbox
watchers 1118
comments 0

What is STRRAT malware?

STRRAT is a Java-based malware that has been active since at least mid-2020. It is intended for a number of malicious purposes, including exfiltrating data from users’ browsers and email clients, keylogging, stealing files, as well as dropping additional malware. The creators of STRRAT are unknown, yet the continued evolution of the malware suggests that the developers behind it are constantly working to improve its capabilities.

The use of Java, a language that has largely lost its popularity over the past decade, does not prevent STRRAT from infecting numerous machines across the globe every year. Although the early versions of the malware required the presence of Java Runtime Environment (JRE) on the victim’s computer, the newer ones can do without it. Instead, they scan the system and install the JRE software downloaded from one of the remote servers.

While STRRAT continues to be distributed using simple .jar files, there are also instances of weaponized .pdfs and .xlsbs. Some attackers also use the polyglot technique to spread the malware (CVE-2020-1464). Specifically, they can combine two file formats (e.g., .msi and .jar) to circumvent security systems. Such files are usually sent as attachments to emails disguised as legitimate documents, including receipts and invoices, as part of spam or phishing campaigns.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the STRRAT malicious software

Similar to other remote access trojans, such as XWorm and AsyncRAT, STRRAT enables criminals to engage in:

  • Remote control: The malware lets its operators access the PC of their victim, view the screen of the device, and even reboot it.
  • Data theft: It can be used to gather sensitive data, including passwords, credit card information, and browser history.
  • File management: The program has the capacity to extract files from different directories. It can also upload, delete, and open files.
  • Malware installation: STRRAT can drop other malicious software.
  • Webcam and microphone recording: The spying capabilities of the malware make it possible for attackers to record users’ conversations and take photos.
  • Keylogging: It can transmit all the keystrokes detected on the infected machine to its C2C server. Alternatively, it can record the information in an offline mode and transfer it once the connection is established again.

Additionally, it can act as a reverse proxy server for attackers, listen for incoming RDP connections, as well as execute cmd and PowerShell commands. The malware can download and install new updates from a remote server, allowing it to receive the latest features and capabilities, and to evade detection by antivirus software.

Another notable feature of STRRAT is its “crimson” module, which makes an attempt at encrypting victims’ files by adding the .crimson extension to them. Yet, by manually removing this extension, users can once again access their files. Basically, STRRAT poorly imitates the behavior of full-scale ransomware, such as WannaCry.

In terms of obfuscation, the latest version of the malware, namely the 1.6 one, employs two commercial obfuscators, Zelix KlassMaster (ZKM) and Allatori. One of the ways that STRRAT achieves persistence is by creating a scheduled task, masked under the name of a legitimate process such as "Skype.exe." In addition to creating a scheduled task, STRRAT also changes the autorun value and writes itself into the startup menu. This ensures that the malware will launch again after the operating system is rebooted.

STRRAT is capable of easily gaining elevated privileges on the system, which gives more power to the attacker. You can learn more about the techniques used by STRRAT by reading the article STRRAT: Malware Analysis of a JAR archive.

Execution process of STRRAT

To get a better understanding of the techniques used by the malware and collect its IOCs, STRRAT can be uploaded to the ANY.RUN interactive sandbox.

Upon execution, STRRAT drops DLL files onto the disk and initiates a persistent task that runs every 30 minutes via the task scheduler. This task spawns a new process that generates WMI queries for system information. The malware then starts a benign Windows application that serves as a launchpad for an embedded malicious payload, in this case, Formbook.

Read a detailed analysis of STRRAT in our blog.

STRRAT process tree STRRAT's process tree

Distribution methods of the STRRAT malware

Phishing email campaigns remain the go-to method for threat actors to launch attacks using STRRAT against victims. Such emails typically mimic the branding and logos of trusted organizations, making them appear legitimate.

For instance, one of the documented cases related to STRRAT involved a fake email from the MAERSK shipping company. By unknowingly downloading and opening files attached to these emails, victims can kick off a chain reaction resulting in attackers gaining full control over their computers.

Conclusion

The STRRAT malware has proven to be a persistent challenge over the past 3 years. Individual users and SMEs are the groups primarily targeted by threat actors who use this malware. This puts an emphasis on the importance of having a reliable and fast tool like ANY.RUN for scanning suspicious links and files. The service generates comprehensive reports on the behavior of any sample in seconds and provides a conclusive verdict on whether a certain file or URL is malicious or not.

Try ANY.RUN for free – request a demo!.

HAVE A LOOK AT

Grandoreiro screenshot
Grandoreiro
grandoreiro
Grandoreiro is a Latin American banking trojan first observed in 2016. It targets mostly Spanish-speaking countries, such as Brazil, Spain, Mexico and Peru. This malware is operated as a Malware-as-a-Service (MaaS), which makes it easily accessible for cybercriminals. Besides, it uses advanced techniques to evade detection.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
Gh0st RAT screenshot
Gh0st RAT
gh0st
Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.
Read More
WarmCookie screenshot
WarmCookie
badspace
WarmCookie is a backdoor malware that cyber attackers use to gain initial access to targeted systems. It is often distributed through phishing emails, frequently using job recruitment lures to entice victims into downloading and executing the malware.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
DarkGate screenshot
DarkGate
darkgate
DarkGate is a loader, which possesses extensive functionality, ranging from keylogging to crypto mining. Written in Delphi, this malware is known for the use of AutoIT scripts in its infection process. Thanks to this malicious software’s versatile architecture, it is widely used by established threat actors.
Read More