General

  • Target

    419d10b439ad860e1c5a2eae42d59eea6977d4c2ce92ef8f4a802c023159364a

  • Size

    128KB

  • Sample

    221128-q8cfasda2w

  • MD5

    c6eeb1bb3904f433809ce8b8a12b7c35

  • SHA1

    5b57f8b8f456c33496c7c00744db87406f74e629

  • SHA256

    419d10b439ad860e1c5a2eae42d59eea6977d4c2ce92ef8f4a802c023159364a

  • SHA512

    13c8c96fd97d446793a8d92b651cd0f3ceae65b40b2e71f439971f6b375febf2b92b0b6d40743536f2742122bdd05181885fe6d3aae62dbf9fc0717afe7f3512

  • SSDEEP

    3072:frTmJ/vElJSz42qljMMMMMMmugPo5OOLcBfNTYRAHNl48xuZt/:DTqvgJG4hljMMMMMMmu6o5OOLcBfNTYJ

Malware Config

Targets

    • Target

      419d10b439ad860e1c5a2eae42d59eea6977d4c2ce92ef8f4a802c023159364a

    • Size

      128KB

    • MD5

      c6eeb1bb3904f433809ce8b8a12b7c35

    • SHA1

      5b57f8b8f456c33496c7c00744db87406f74e629

    • SHA256

      419d10b439ad860e1c5a2eae42d59eea6977d4c2ce92ef8f4a802c023159364a

    • SHA512

      13c8c96fd97d446793a8d92b651cd0f3ceae65b40b2e71f439971f6b375febf2b92b0b6d40743536f2742122bdd05181885fe6d3aae62dbf9fc0717afe7f3512

    • SSDEEP

      3072:frTmJ/vElJSz42qljMMMMMMmugPo5OOLcBfNTYRAHNl48xuZt/:DTqvgJG4hljMMMMMMmu6o5OOLcBfNTYJ

    • Modifies firewall policy service

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks