General

  • Target

    1b0c7bbbc248e87ced6d7dfcf5c6eccb836cf4231b57a9dee9d32accc7be6fcb

  • Size

    135KB

  • Sample

    221127-qkbtvsec2y

  • MD5

    0f97e3eb5d8f3ff7433ee79f473938b7

  • SHA1

    a092ae9baca1cb1d857f338b6b0bf5d5aede249a

  • SHA256

    1b0c7bbbc248e87ced6d7dfcf5c6eccb836cf4231b57a9dee9d32accc7be6fcb

  • SHA512

    aa240e52b849488f1494ea038ad1cd9f7d78c2c5656d2a090ac0547a55da3cab0999be21fa14aab0a661661f91ca6139d830b4fa82e4fbe5948dd6c7877d2bb0

  • SSDEEP

    3072:CWT3yCfxZfucU3s+q8g53z4JZPKL5K0Ub2nl:CWzyWTGN3sI+3zKP8rl

Malware Config

Targets

    • Target

      1b0c7bbbc248e87ced6d7dfcf5c6eccb836cf4231b57a9dee9d32accc7be6fcb

    • Size

      135KB

    • MD5

      0f97e3eb5d8f3ff7433ee79f473938b7

    • SHA1

      a092ae9baca1cb1d857f338b6b0bf5d5aede249a

    • SHA256

      1b0c7bbbc248e87ced6d7dfcf5c6eccb836cf4231b57a9dee9d32accc7be6fcb

    • SHA512

      aa240e52b849488f1494ea038ad1cd9f7d78c2c5656d2a090ac0547a55da3cab0999be21fa14aab0a661661f91ca6139d830b4fa82e4fbe5948dd6c7877d2bb0

    • SSDEEP

      3072:CWT3yCfxZfucU3s+q8g53z4JZPKL5K0Ub2nl:CWzyWTGN3sI+3zKP8rl

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks