General

  • Target

    af9faa36dfa99d285a266bc0f11d6436.exe

  • Size

    100KB

  • Sample

    201226-wcd7ymx7qa

  • MD5

    af9faa36dfa99d285a266bc0f11d6436

  • SHA1

    78cdd663c8a7fafdedf787aa56ada343dae051ce

  • SHA256

    ef03a58568ec094636fe33261e1fafbb6aa77125be68c3615da4823abba198d8

  • SHA512

    ed8a80b6994f6dc4702de6568b84e9fc7b344e00dddfd4def847dcbb852ef8b295a3979aae20e5601c302ef5af180d095600e791ba95bf973ed24e854edab304

Malware Config

Targets

    • Target

      af9faa36dfa99d285a266bc0f11d6436.exe

    • Size

      100KB

    • MD5

      af9faa36dfa99d285a266bc0f11d6436

    • SHA1

      78cdd663c8a7fafdedf787aa56ada343dae051ce

    • SHA256

      ef03a58568ec094636fe33261e1fafbb6aa77125be68c3615da4823abba198d8

    • SHA512

      ed8a80b6994f6dc4702de6568b84e9fc7b344e00dddfd4def847dcbb852ef8b295a3979aae20e5601c302ef5af180d095600e791ba95bf973ed24e854edab304

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Remote System Discovery

1
T1018

Tasks