Analysis
-
max time kernel
150s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2022 05:05
Behavioral task
behavioral1
Sample
c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
c.exe
Resource
win10v2004-20220721-en
General
-
Target
c.exe
-
Size
68KB
-
MD5
e1f2bab0f7d22fed80ad59fd5c164dc1
-
SHA1
586afa9c3bdbbd0a326b569dcab9363f1278e38c
-
SHA256
d759e1ec1af4392131aa3aa7f8446f8078d16bb3405b12ed62f123aca95c969c
-
SHA512
a50ddedff971b2ae6d9d9fc5669f2fc9cb94494fa647c2ea4ea2072b5b5c3c6a06e766774656294265cc8356d1c1dc50dc0f6896868c01ed30cd633cd1048551
Malware Config
Signatures
-
RunningRat
RunningRat is a remote access trojan first seen in 2018.
-
RunningRat payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/456-130-0x0000000010000000-0x000000001000F000-memory.dmp family_runningrat -
Loads dropped DLL 2 IoCs
Processes:
c.exepid process 456 c.exe 456 c.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5b275f4b7334e4b7de09886368584fa03
SHA1f1d9c686d6688bb384f13c3d48b035f26fc63f7e
SHA256a83cf59d71d9c868acf7f0c83afbad3d56b4bf07d7885400b3bf85ee56bd1e34
SHA512ac17902025f49652860f0002d309ccd85364d532ef656224ddc2394bcde09c99fab1ef0b8caf10b71340ae243b8c911719895f93563aa3938f0a153e93aec1d9
-
Filesize
37KB
MD5b275f4b7334e4b7de09886368584fa03
SHA1f1d9c686d6688bb384f13c3d48b035f26fc63f7e
SHA256a83cf59d71d9c868acf7f0c83afbad3d56b4bf07d7885400b3bf85ee56bd1e34
SHA512ac17902025f49652860f0002d309ccd85364d532ef656224ddc2394bcde09c99fab1ef0b8caf10b71340ae243b8c911719895f93563aa3938f0a153e93aec1d9