General

  • Target

    b6e1c130d2b9f81e9457197727bb12e29093f29bf80408c2351bbad8cf821d4f

  • Size

    48KB

  • Sample

    240615-jnss8asgnd

  • MD5

    2b6bdd0a18e76a5df3a867a49f951125

  • SHA1

    f0286405e8c8efb11ad4d30b29f32268ea747c09

  • SHA256

    b6e1c130d2b9f81e9457197727bb12e29093f29bf80408c2351bbad8cf821d4f

  • SHA512

    ef06c218ad5daf8437fda94c991a4ba86e3bdfd7ef55b64d8fdbe4657bb7acf512c42e7158cce17943a3aa437f96d294dae6eeb908d1f8acacdc4ddb25f27915

  • SSDEEP

    768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67ahPC:Ub1MsHz3JDwhyWr+N95OTga6Z

Malware Config

Targets

    • Target

      b6e1c130d2b9f81e9457197727bb12e29093f29bf80408c2351bbad8cf821d4f

    • Size

      48KB

    • MD5

      2b6bdd0a18e76a5df3a867a49f951125

    • SHA1

      f0286405e8c8efb11ad4d30b29f32268ea747c09

    • SHA256

      b6e1c130d2b9f81e9457197727bb12e29093f29bf80408c2351bbad8cf821d4f

    • SHA512

      ef06c218ad5daf8437fda94c991a4ba86e3bdfd7ef55b64d8fdbe4657bb7acf512c42e7158cce17943a3aa437f96d294dae6eeb908d1f8acacdc4ddb25f27915

    • SSDEEP

      768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67ahPC:Ub1MsHz3JDwhyWr+N95OTga6Z

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks