General

  • Target

    895a942770bb5e586cab205fd2735c0c1226144555740d5c94650dde213da8fc

  • Size

    76KB

  • Sample

    230822-k8yewabc97

  • MD5

    037247624f4a3e9437b2dfa0a19a0cc8

  • SHA1

    2edabe9247d20418c0fdb20c9f0660bb30c70c8c

  • SHA256

    895a942770bb5e586cab205fd2735c0c1226144555740d5c94650dde213da8fc

  • SHA512

    1e957a569616ec61ce2e2fe7f9185aa150916dd6097cb6ae24247614e800ad01903a3a03cb2325772e672da722ca447f9fb7e8e6f42bfd83dd98d22cde080639

  • SSDEEP

    768:Z1zRSL+BoBxN9tpdC7EezJ0d8hPUtrFRtFtg3NojiwvuccA4iiKahtAZchKD6EWr:l3oBdk7ESuqhParNMKnFfiroZchUfSF

Malware Config

Targets

    • Target

      895a942770bb5e586cab205fd2735c0c1226144555740d5c94650dde213da8fc

    • Size

      76KB

    • MD5

      037247624f4a3e9437b2dfa0a19a0cc8

    • SHA1

      2edabe9247d20418c0fdb20c9f0660bb30c70c8c

    • SHA256

      895a942770bb5e586cab205fd2735c0c1226144555740d5c94650dde213da8fc

    • SHA512

      1e957a569616ec61ce2e2fe7f9185aa150916dd6097cb6ae24247614e800ad01903a3a03cb2325772e672da722ca447f9fb7e8e6f42bfd83dd98d22cde080639

    • SSDEEP

      768:Z1zRSL+BoBxN9tpdC7EezJ0d8hPUtrFRtFtg3NojiwvuccA4iiKahtAZchKD6EWr:l3oBdk7ESuqhParNMKnFfiroZchUfSF

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • Sets DLL path for service in the registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks