General

  • Target

    172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21

  • Size

    78KB

  • Sample

    221128-g9ahnage3x

  • MD5

    c570ee611c48429227db6e72b023b4f6

  • SHA1

    0ba0db44e366d4f8e1e8f43cfaf3d055dfc56bfd

  • SHA256

    172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21

  • SHA512

    42fa760b5f9fc635e3a909335103df497b0139b8622abd27bdb75e4fe3dd4c74132720ea1912d6e02ea3a077b2db9189c19842981bde3c54f888b795a0bdece3

  • SSDEEP

    1536:dxETPkgcky/Vht7ILmkAP3S3pzJuhyicgcqd33+9fAbsZ7Yg53zf:dWT3yCfnZfucU3s+q8g53zf

Malware Config

Targets

    • Target

      172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21

    • Size

      78KB

    • MD5

      c570ee611c48429227db6e72b023b4f6

    • SHA1

      0ba0db44e366d4f8e1e8f43cfaf3d055dfc56bfd

    • SHA256

      172ad6fbb2e66c84d2e233a65d9d84ad069e6cc21f313561abb4cb9a5aa6dd21

    • SHA512

      42fa760b5f9fc635e3a909335103df497b0139b8622abd27bdb75e4fe3dd4c74132720ea1912d6e02ea3a077b2db9189c19842981bde3c54f888b795a0bdece3

    • SSDEEP

      1536:dxETPkgcky/Vht7ILmkAP3S3pzJuhyicgcqd33+9fAbsZ7Yg53zf:dWT3yCfnZfucU3s+q8g53zf

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks