Monday, June 16, 2025
HomeCyber AttackHackers Deliver Updated STRRAT Malware Using Weaponized PDF Files

Hackers Deliver Updated STRRAT Malware Using Weaponized PDF Files

Published on

SIEM as a Service

Follow Us on Google News

A versatile Java-based RAT that is capable of keylogging and credential theft from browsers and email clients emerged in 2020 that is dubbed “STRRAT.”

The most recent updated version of STRRAT evolved dramatically, and since its discovery, it has been observed that it now does the following things:-

  • Incorporates “Crimson” Ransomware module.
  • Deploys a multitude of infection chains.

A new technique that involves two string obfuscation methods has been recently identified by the cybersecurity researchers at Cyble Research And Intelligence Labs (CRIL) to distribute STRRAT (version 1.6).

- Advertisement - Google News

Malware Infection chain

With a spam email posing as an electronic company, the infection chain begins, and here the email includes a PDF invoice attachment sent to the target.

Infection chain (Source – Cyble)

When the attached PDF is opened it displays a download image that prompts the user to click on it, which initiates the download of “Invo-0728403.zip” from the following URL:-

  • hxxps://tatchumbemerchants[.]co.ke/Invo-0728403[.]zip
Malicious PDF attachment (Source – Cyble)

Downloaded Zip holds encrypted STRRAT payload in JavaScript. Upon execution, JS decrypts the payload, placing “lypbtrtr.txt” in the following directory:-

  • \AppData\Roaming

File type check reveals a disguised JAR (zip) file that extracts the “carLambo” folder and META-INF with classes, resources, and MANIFEST.MF which ensures it is “STRRAT malware.

Content of JAR file (Source – Cyble)

The analysis of the latest variant of STRRAT malware shows class name modifications and two string obfuscators (Allatori, ZKM) used, unlike the prior version that used only “Allatori.”

Distribution & Persistance

Since March 2023, the STRRAT malware (version 1.6) is actively distributed through multiple infection chains, and not only that in the wild more than 70 samples were detected.

For persistence, it sets the “Skype” task scheduler entry, and STRRAT 1.6 stores C&C server info in an encrypted Base64-encoded config.txt file with AES encryption, as in previous versions.

Here below we have mentioned the browsers that are targeted:-

  • Chrome
  • Firefox
  • Internet Explorer 

Here below we have mentioned the email clients that are targeted:-

  • Outlook
  • Thunderbird
  • Foxmail

Recommendations

Here below we have mentioned all the recommendations that are offered by the security analysts:-

  • Always use strong email filter solutions.
  • Make sure to verify the links and attachments before opening them.
  • Always use robust endpoint security solutions. 
  • Keep security tools updated with the latest available patches and updates.
  • Implement URL filtering to block malicious sites.
  • Conduct regular employee cybersecurity training.

IoCs

IoCs (Source – Cyble)
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...