Overview
overview
8Static
static
8NullRAT/RAT.py
windows7-x64
3NullRAT/RAT.py
windows10-2004-x64
3NullRAT/mo...ass.py
windows7-x64
3NullRAT/mo...ass.py
windows10-2004-x64
3NullRAT/mo...ens.py
windows7-x64
3NullRAT/mo...ens.py
windows10-2004-x64
3NullRAT/mo...ard.py
windows7-x64
3NullRAT/mo...ard.py
windows10-2004-x64
3NullRAT/mo...ule.py
windows7-x64
3NullRAT/mo...ule.py
windows10-2004-x64
3NullRAT/mo...ory.py
windows7-x64
3NullRAT/mo...ory.py
windows10-2004-x64
3NullRAT/mo...ate.py
windows7-x64
3NullRAT/mo...ate.py
windows10-2004-x64
3NullRAT/mo...env.py
windows7-x64
3NullRAT/mo...env.py
windows10-2004-x64
3NullRAT/mo...ile.py
windows7-x64
3NullRAT/mo...ile.py
windows10-2004-x64
3NullRAT/mo...ens.py
windows7-x64
3NullRAT/mo...ens.py
windows10-2004-x64
3NullRAT/mo...les.py
windows7-x64
3NullRAT/mo...les.py
windows10-2004-x64
3NullRAT/mo...ile.py
windows7-x64
3NullRAT/mo...ile.py
windows10-2004-x64
3NullRAT/mo...hot.py
windows7-x64
3NullRAT/mo...hot.py
windows10-2004-x64
3NullRAT/mo...les.py
windows7-x64
3NullRAT/mo...les.py
windows10-2004-x64
3NullRAT/mo...ell.py
windows7-x64
3NullRAT/mo...ell.py
windows10-2004-x64
3NullRAT/mo...tup.py
windows7-x64
3NullRAT/mo...tup.py
windows10-2004-x64
3Analysis
-
max time kernel
838s -
max time network
839s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 16:32
Behavioral task
behavioral1
Sample
NullRAT/RAT.py
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
NullRAT/RAT.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
NullRAT/modules/ChangePass.py
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
NullRAT/modules/ChangePass.py
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
NullRAT/modules/checkedtokens.py
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
NullRAT/modules/checkedtokens.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
NullRAT/modules/clipboard.py
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
NullRAT/modules/clipboard.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
NullRAT/modules/create_new_module.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
NullRAT/modules/create_new_module.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
NullRAT/modules/directory.py
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
NullRAT/modules/directory.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
NullRAT/modules/geolocate.py
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
NullRAT/modules/geolocate.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
NullRAT/modules/getenv.py
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
NullRAT/modules/getenv.py
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
NullRAT/modules/hideFile.py
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
NullRAT/modules/hideFile.py
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
NullRAT/modules/rawtokens.py
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
NullRAT/modules/rawtokens.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
NullRAT/modules/receivefiles.py
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
NullRAT/modules/receivefiles.py
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
NullRAT/modules/runfile.py
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
NullRAT/modules/runfile.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
NullRAT/modules/screenshot.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
NullRAT/modules/screenshot.py
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
NullRAT/modules/sendfiles.py
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
NullRAT/modules/sendfiles.py
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
NullRAT/modules/shell.py
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
NullRAT/modules/shell.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
NullRAT/modules/startup.py
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
NullRAT/modules/startup.py
Resource
win10v2004-20240611-en
General
-
Target
NullRAT/RAT.py
-
Size
7KB
-
MD5
53b9d54a9581a7e043e8267abfeee7bf
-
SHA1
621ee8223b64079c5aa68036d8cfc3e7fac2f6fc
-
SHA256
a4db7a6f8861e3f554bfb9ced2912d8fe0bbaf74f08d507ee159d1775bfb7990
-
SHA512
a91a90fe3a6c290f6a2aed0cc6e1bee7b2a46f50f8294379c5ff3889985a5a1a886e81c10a4e04235e6cea587a78c9ec3024d4d0d5dd9573cb25a7bce4229491
-
SSDEEP
192:nOdJkyK1Irlev/Vko1VODfqifRgzTkv2+1M0hW/KPk+O9:nODlev/VNVoRgPkO+10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\py_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2792 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 AcroRd32.exe 2792 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2144 3068 cmd.exe 29 PID 3068 wrote to memory of 2144 3068 cmd.exe 29 PID 3068 wrote to memory of 2144 3068 cmd.exe 29 PID 2144 wrote to memory of 2792 2144 rundll32.exe 30 PID 2144 wrote to memory of 2792 2144 rundll32.exe 30 PID 2144 wrote to memory of 2792 2144 rundll32.exe 30 PID 2144 wrote to memory of 2792 2144 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NullRAT\RAT.py1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\NullRAT\RAT.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\NullRAT\RAT.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD597ae1879c4870f6e68fdb1d15497a276
SHA162f0cfe8c99825254f2045f7710d114369b957c5
SHA256ee060136f6676c894c15c39365410f8b5e91ef3c4ba272281696962f474c8ad7
SHA5121b36b38ac5ce81514718373d7ff4fd539876fae16779d6d94d79f1b452797ad38eecd7815c99085ec924cfe5608c459dbd91d89111b21911d7952cfd9260549e