General

  • Target

    RAT.zip

  • Size

    4.6MB

  • MD5

    dcedb9512531b041cb158200ebf0903a

  • SHA1

    13b4817400f28e7728bd3b73ca305f68de9a05da

  • SHA256

    0d6e873aa8faee0a896e6ac7679a216585933bc29bdd2c1bc006ce56a6e86818

  • SHA512

    dc9c0faed5d66855d8a48b87ccb1c29c33628ea44c83fa36a6a48ce043af89be6d9f4f9989fb1b5860ae4478a4e8aaae15b1e515e92147676b84b84219fa3160

  • SSDEEP

    98304:3Jgh27PjFtfeDmhXdckuXqxlPaD3xzt5XVn5/3t6:3JghwCD0adIpaDlttdn6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Geforce

C2

startitit2-23969.portmap.host:1604

Mutex

b9584a316aeb9ca9b31edd4db18381f5

Attributes
  • reg_key

    b9584a316aeb9ca9b31edd4db18381f5

  • splitter

    Y262SUCZ4UJJ

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

nickman12-46565.portmap.io:46565

nickman12-46565.portmap.io:1735

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    Userdata.exe

  • copy_folder

    Userdata

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %WinDir%\System32

  • mouse_option

    false

  • mutex

    remcos_vcexssuhap

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Signatures

  • Darkcomet family
  • ModiLoader First Stage 1 IoCs
  • Modiloader family
  • Njrat family
  • Remcos family
  • RevengeRat Executable 1 IoCs
  • Revengerat family
  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Unsigned PE 8 IoCs

    Checks for missing Authenticode signature.

Files

  • RAT.zip
    .zip
  • RAT/Adwind.exe
    .jar
  • RAT/Blackkomet.exe
    .exe windows:4 windows x86 arch:x86

    3b163548c984476f39d30c2f21df2b6c


    Headers

    Imports

    Sections

  • RAT/CobaltStrike.doc
    .docm .doc office2007
  • RAT/CrimsonRAT.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • RAT/NJRat.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • RAT/NetWire.doc
    .doc windows office2003

    ThisDocument

    HauteGaronne

  • RAT/NetWire.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • RAT/Remcos.exe
    .exe windows:4 windows x86 arch:x86

    d3a62971944197f0701c7049a9c739d1


    Headers

    Imports

    Sections

  • RAT/RevengeRAT.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • RAT/VanToM-Rat.bat
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • RAT/WarzoneRAT.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections