StrifeWater

Malware updated 4 months ago (2024-05-05T09:17:31.713Z)
Download STIX
Preview STIX
StrifeWater is a stealthy Remote Access Trojan (RAT) used in targeted ransomware attacks, primarily deployed by the Iranian APT group, Moses Staff. This malware has been identified as a key tool for initial infiltration and reconnaissance on compromised targets, with various capabilities including listing system files, executing system commands, taking screen captures, creating persistence, and downloading updates and auxiliary modules. StrifeWater is typically introduced into the system under the name "calc.exe" and has the unique ability to remove itself from the system to cover the tracks of the attackers, making it difficult for investigators to fully understand the attack flow. The deployment of StrifeWater appears to be part of a broader hacking operation conducted by Moses Staff, which involves exfiltrating data from targeted organizations using custom tools like PyDCrypt, DCSrv, and StrifeWater. The RAT distinguishes between types of data being sent to the command and control server (C2) using specific parameters, although the functionality of additional modules downloaded based on received commands remains unknown. It's suspected that StrifeWater is one of the main tools used to establish a foothold in victim environments, predominantly during the earlier stages of an attack. Cybereason's Nocturnus Team has been at the forefront of analyzing this previously unknown RAT, StrifeWater, and its role in targeted ransomware attacks. Their XDR Platform successfully detects and blocks StrifeWater RAT and other advanced tactics, techniques, and procedures (TTPs) used in these operations. Despite the stealthy nature of StrifeWater, Cybereason's efforts have provided valuable insights into the workings of this RAT and the broader operations of the Moses Staff group.
Description last updated: 2024-05-05T08:26:03.160Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
PyDCryptUnspecified
2
PyDCrypt is a malicious software (malware) variant deployed by the Moses Staff group, primarily targeting Israeli companies. The malware is written in Python and built with PyInstaller, designed to infect other computers on a network and execute the main payload, DCSrv. It is typically used in the l
DCSrvUnspecified
2
DCSrv is a variant of ransomware developed by the threat group known as Moses Staff. According to research conducted by the Cybereason Nocturnus team, DCSrv was discovered as part of the Moses Staff arsenal, alongside other tools such as PyDCrypt and StrifeWater. The malware disguises itself as the
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
Moses StaffUnspecified
2
Moses Staff, an Iranian Advanced Persistent Threat (APT) group, has emerged as a significant cybersecurity threat. The Cybereason Nocturnus Team has been monitoring the activities of this group since 2021, and it has been linked to several major ransomware-style attacks. Initially categorized as hac
Source Document References
Information about the StrifeWater Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securelist
a year ago
A hack in hand is worth two in the bush
MITRE
2 years ago
StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations
MITRE
2 years ago
PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage