General

  • Target

    08d49d88c70b139a00f9eb87de734644.exe

  • Size

    100KB

  • Sample

    201227-3993hhxgh6

  • MD5

    08d49d88c70b139a00f9eb87de734644

  • SHA1

    1624a339f5bdfd5f166c211b5d4f06ab489cd406

  • SHA256

    9b1367b0da26125af6946a108e9e657c373ad4e25be8e9a9eaa3a29adf6c95d9

  • SHA512

    ae06bff8cd9f6d8a0cd07da540122d6bfb26c7061c7a2f3d6d1cf5b547ee73e67a321ac6600016e5c2ae3c8c599533442930454f8ac180696fd6ce5f9b0e7cb4

Malware Config

Targets

    • Target

      08d49d88c70b139a00f9eb87de734644.exe

    • Size

      100KB

    • MD5

      08d49d88c70b139a00f9eb87de734644

    • SHA1

      1624a339f5bdfd5f166c211b5d4f06ab489cd406

    • SHA256

      9b1367b0da26125af6946a108e9e657c373ad4e25be8e9a9eaa3a29adf6c95d9

    • SHA512

      ae06bff8cd9f6d8a0cd07da540122d6bfb26c7061c7a2f3d6d1cf5b547ee73e67a321ac6600016e5c2ae3c8c599533442930454f8ac180696fd6ce5f9b0e7cb4

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Remote System Discovery

1
T1018

Tasks