General

  • Target

    2a6e6b54b6457078087ac12858f106b9.exe

  • Size

    17.3MB

  • Sample

    211204-yjpckaecb9

  • MD5

    2a6e6b54b6457078087ac12858f106b9

  • SHA1

    f573237cc96366fc92dfcdc7872ecab082b11e84

  • SHA256

    93015eaddcf1cfed7c9e455cecebc51e85a5de3035282bafbfdd2b0979e46021

  • SHA512

    6bb010e56bfeed60ee5262fd62b721cd3a58e8c6361f194058d5cb462e67eef1dcdcec6477c5d4afd3845c9b76e09bb998afb779fa332d2fcbb7574bcf16da4b

Malware Config

Targets

    • Target

      2a6e6b54b6457078087ac12858f106b9.exe

    • Size

      17.3MB

    • MD5

      2a6e6b54b6457078087ac12858f106b9

    • SHA1

      f573237cc96366fc92dfcdc7872ecab082b11e84

    • SHA256

      93015eaddcf1cfed7c9e455cecebc51e85a5de3035282bafbfdd2b0979e46021

    • SHA512

      6bb010e56bfeed60ee5262fd62b721cd3a58e8c6361f194058d5cb462e67eef1dcdcec6477c5d4afd3845c9b76e09bb998afb779fa332d2fcbb7574bcf16da4b

    • RuRAT

      RuRAT is a remote admin tool sold as legitimate software but regularly abused in malicious phishing campaigns.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks