General

  • Target

    f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521.exe

  • Size

    48KB

  • Sample

    240615-mrrl4s1ejk

  • MD5

    7d8056785948284e8f6b89004886c936

  • SHA1

    fb954f84b2c0afffb5e788b04029563685054dee

  • SHA256

    f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521

  • SHA512

    dc11f4669102af7fa6f5b44ead415e12317d65d2847f806a1ffc92a3b5a626a0c74d2c49592b7259f56a0299748a8599e5ab6983b7dec335a04106d44312aa06

  • SSDEEP

    768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67ChPC:Ub1MsHz3JDwhyWr+N95OTga6R

Malware Config

Targets

    • Target

      f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521.exe

    • Size

      48KB

    • MD5

      7d8056785948284e8f6b89004886c936

    • SHA1

      fb954f84b2c0afffb5e788b04029563685054dee

    • SHA256

      f59d23fcb44d07bd1cfc3852bc17b60cc4c35a21a66125953d6f5f697131a521

    • SHA512

      dc11f4669102af7fa6f5b44ead415e12317d65d2847f806a1ffc92a3b5a626a0c74d2c49592b7259f56a0299748a8599e5ab6983b7dec335a04106d44312aa06

    • SSDEEP

      768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67ChPC:Ub1MsHz3JDwhyWr+N95OTga6R

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks