Skip to main content

STRRAT Remote Access Trojan

STRRAT is a remote access trojan which targets Windows systems via spam campaigns. It acts as a backdoor, stealing credentials from browsers and email clients. Unusually, it disguises itself as ransomware by appending file extensions but does not encrypt data.

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

STRRAT is a remote access trojan which targets Windows systems via spam campaigns. It acts as a backdoor, stealing credentials from browsers and email clients. Unusually, it disguises itself as ransomware by appending file extensions but does not encrypt data.


Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

First observed in June 2020, STRRAT is a remote access trojan (RAT), written in Java, with a wide range of malicious functionality. It is delivered via spam emails, acting as a backdoor on a compromised host from where it can run shell commands, steal credentials and tamper with local files. It is unusual in that it performs a fake encryption routine, appending file extensions but not encrypting the file itself, in attempt to imitate a ransomware attack.


Delivery

STRRAT is deployed through spam campaigns, launched via compromised email accounts. In recent campaigns, the emails contain an image disguised as a PDF attachment, that once opened, connects to a malicious domain from where STRRAT payload is downloaded. In other attacks, STRRAT has been delivered via an email containing a malicious JAR attachment. The attachment is a dropper which uses a VBA script to download a Java Runtime Environment before extracting and running the STRRAT payload.


Activities

Once executed, STRRAT connects to a command and control (C2) server from where it can run custom shell and PowerShell commands. It can also download and install RDWrap tool, enabling an attacker to connect to the compromised host through Remote Desktop Protocol (RDP). This functionality allows an attacker to run a range of commands and take control of the host system.

STRRAT attempts to extract credentials from the following browsers and email clients: Firefox, Internet Explorer, Chrome, Foxmail, Outlook, and Thunderbird. It also harvests passwords via keylogging, utilising a global keyboard and mouse listener for Java.

STRRAT has a ransomware encryption/decryption module, which renames files by appending a CRIMSON file extension but does not encrypt them. Once the files have been renamed and the extension removed, the files can be opened.


Remediation advice

To prevent and detect an infection, NHS Digital advises that:

  • Secure configurations are applied to all devices.
  • Security updates are applied at the earliest opportunity.
  • Tamper protection settings in security products are enabled where available.
  • Obsolete platforms are segregated from the rest of the network.
  • IT usage policies are reinforced by regular training to ensure all users know not to open unsolicited links or attachments.
  • Multi-factor authentication (MFA) and lockout policies are used where practicable, especially for administrative accounts.
  • Administrative accounts are only used for necessary purposes.
  • Remote administration services use strongly encrypted protocols and only accept connections from authorised users or locations.
  • Systems are continuously monitored, and unusual activity is investigated, so that a compromise of the network can be detected as early as possible.

Please note that NCSC maintains guidance for securely configuring a wide range of end user device (EUD) platforms. For further details refer to their end user device security guidance pages.


Indicators of compromise

Network indicators

Domains

  • adamridley[.]co.uk
  • alfredoscafeltd[.]co.uk
  • bentlyconstbuild[.]co.uk
  • buildersworlinc[.]co.uk
  • fillinaresortsltd[.]co.uk
  • gossyexperience[.]co.uk
  • jeffersonsandc[.]co.uk
  • jpfletcherconsultancy[.]co.uk
  • metroscaffingltg[.]co.uk
  • pg-finacesolutions[.]co.uk
  • playerscircleinc[.]co.uk
  • sivospremiumclub[.]co.uk
  • tg-cranedinc[.]co.uk
  • tk-consultancyltd[.]co.uk
  • westcoasttrustedtaxis[.]co.uk
  • zincocorporation[.]co.uk
Host indicators

Filenames

  • 1124150.eml
  • bqhoonmpho.vbs
  • edeKbMYRtr.vbs
  • multrdp.jpg
  • NEW ORDER.jar
  • ntfsmgr.ja

SHA256 hashes

  • 0f0e25e859bc6f21447ed196d557eb6cdba9737dd3de22a5183a505da0126302
  • 7c24d99685623b604aa4b2686e9c1b843a4243eb1b0b7b096d73bcae3d8d5a79
  • ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
  • b76e2eea653b480c8a559215aa08806fad4c83c60f9a5996e89d51709212ee29
  • e6b0a56662d1f0544257c63e63b2f85ad7215f0df3a7f5a689dee66f27e24db7

Last edited: 27 May 2021 3:40 pm