General
-
Target
rat.exe
-
Size
30.6MB
-
Sample
241010-r4cqya1blh
-
MD5
dbbfefbdaf205b4b407525aec7fbe773
-
SHA1
d7e7c8a3aca2edf52bdafde4812aa14ab5fb1c66
-
SHA256
09619c6b7f13bb6463bf753ae87c5232b9bca99630fee5d0ebc6edc8a45870f2
-
SHA512
913c043c5a990f79a534d5bf79350592ff1880c8cb84887cde2a6372d52738f175eb42d55455c368e48e6ced8e819b0300c56748b61c563326fdeca0279242fc
-
SSDEEP
786432:rcKwW847XzcY876oBBrW88vWBGeaRAqrT:rcBWFXE7hBB77UeayWT
Behavioral task
behavioral1
Sample
rat.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rat.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
rat.exe
-
Size
30.6MB
-
MD5
dbbfefbdaf205b4b407525aec7fbe773
-
SHA1
d7e7c8a3aca2edf52bdafde4812aa14ab5fb1c66
-
SHA256
09619c6b7f13bb6463bf753ae87c5232b9bca99630fee5d0ebc6edc8a45870f2
-
SHA512
913c043c5a990f79a534d5bf79350592ff1880c8cb84887cde2a6372d52738f175eb42d55455c368e48e6ced8e819b0300c56748b61c563326fdeca0279242fc
-
SSDEEP
786432:rcKwW847XzcY876oBBrW88vWBGeaRAqrT:rcBWFXE7hBB77UeayWT
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1