General

  • Target

    7a9338d26c274fce9e8fc52501604586033c1ae132c1368fd575691961e2fc73

  • Size

    92KB

  • Sample

    221128-akhz6sac38

  • MD5

    2544adda7a677d30aaaf42b7a788b7a9

  • SHA1

    c6cb7e314c7efee3b3e796a054a1a705c8d1119c

  • SHA256

    7a9338d26c274fce9e8fc52501604586033c1ae132c1368fd575691961e2fc73

  • SHA512

    8e1b9f4d24663ac95d602524a90710475d5c995664127cd7f564b55b56d96f0cf2794b3c2b392b6242dee80509f019396fd25378bb2c5bf6f377d9cf81e976a4

  • SSDEEP

    1536:YxETPkgcky/Vht7ILmkAP3T3pzJuhyicgcqd33+9fAbsZ7Yg53zfbF:YWT3yCfUZfucU3s+q8g53zfp

Malware Config

Targets

    • Target

      7a9338d26c274fce9e8fc52501604586033c1ae132c1368fd575691961e2fc73

    • Size

      92KB

    • MD5

      2544adda7a677d30aaaf42b7a788b7a9

    • SHA1

      c6cb7e314c7efee3b3e796a054a1a705c8d1119c

    • SHA256

      7a9338d26c274fce9e8fc52501604586033c1ae132c1368fd575691961e2fc73

    • SHA512

      8e1b9f4d24663ac95d602524a90710475d5c995664127cd7f564b55b56d96f0cf2794b3c2b392b6242dee80509f019396fd25378bb2c5bf6f377d9cf81e976a4

    • SSDEEP

      1536:YxETPkgcky/Vht7ILmkAP3T3pzJuhyicgcqd33+9fAbsZ7Yg53zfbF:YWT3yCfUZfucU3s+q8g53zfp

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks