General

  • Target

    44f7e9aa887f9b4a38d7b2dd3add54630c781501fc9524a7a49ba4d97b1ca8fe

  • Size

    135KB

  • Sample

    221128-cype8agg97

  • MD5

    b90a4d6c901a7ae110400907de75eaaf

  • SHA1

    7f52bddf4f6c770a39e882aab421088e94053afb

  • SHA256

    44f7e9aa887f9b4a38d7b2dd3add54630c781501fc9524a7a49ba4d97b1ca8fe

  • SHA512

    71de9ff0a8b6be9e5d91b6183c3e13d7f065d525b5c2fcf75005b9b7b782443fa8e58ac48e040f4b817599763fae79dd6e0ad4a3aa6d1bfa6b2e20ae7f701142

  • SSDEEP

    3072:CWT3yCf5ZfucU3s+q8g53z42clG4Ggz0MkTN:CWzyWLGN3sI+3zrrGQTN

Malware Config

Targets

    • Target

      44f7e9aa887f9b4a38d7b2dd3add54630c781501fc9524a7a49ba4d97b1ca8fe

    • Size

      135KB

    • MD5

      b90a4d6c901a7ae110400907de75eaaf

    • SHA1

      7f52bddf4f6c770a39e882aab421088e94053afb

    • SHA256

      44f7e9aa887f9b4a38d7b2dd3add54630c781501fc9524a7a49ba4d97b1ca8fe

    • SHA512

      71de9ff0a8b6be9e5d91b6183c3e13d7f065d525b5c2fcf75005b9b7b782443fa8e58ac48e040f4b817599763fae79dd6e0ad4a3aa6d1bfa6b2e20ae7f701142

    • SSDEEP

      3072:CWT3yCf5ZfucU3s+q8g53z42clG4Ggz0MkTN:CWzyWLGN3sI+3zrrGQTN

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks