General

  • Target

    888_RAT.exe

  • Size

    22.0MB

  • Sample

    241221-j7ze4swpaz

  • MD5

    54c6dc01ba6c748106085665ff8ad61b

  • SHA1

    f75d970df21d277d39656aeff50752d415b47c6e

  • SHA256

    27e3e3350715b83a2a3059c008517e1e97b2531557aaefd3b4cee38f62039b1c

  • SHA512

    9b5498b40de25dc788a728979518e3b6edcc1f0a0444f96bb19c68f91036b552b248d78b5f783ee5247eb7f7bb1272b4e4edf3f2c6650674c16b72593eec7f8d

  • SSDEEP

    393216:AP1PWZEdKBGwPLApMDvm9YL8mp3YsxXUSqqEDPqwTOfxUbEe2pjEgSl7ltlx:qUAKZLEym923Ysx2qeoS1mjr4Pf

Malware Config

Targets

    • Target

      888_RAT.exe

    • Size

      22.0MB

    • MD5

      54c6dc01ba6c748106085665ff8ad61b

    • SHA1

      f75d970df21d277d39656aeff50752d415b47c6e

    • SHA256

      27e3e3350715b83a2a3059c008517e1e97b2531557aaefd3b4cee38f62039b1c

    • SHA512

      9b5498b40de25dc788a728979518e3b6edcc1f0a0444f96bb19c68f91036b552b248d78b5f783ee5247eb7f7bb1272b4e4edf3f2c6650674c16b72593eec7f8d

    • SSDEEP

      393216:AP1PWZEdKBGwPLApMDvm9YL8mp3YsxXUSqqEDPqwTOfxUbEe2pjEgSl7ltlx:qUAKZLEym923Ysx2qeoS1mjr4Pf

    • 888RAT

      888RAT is an Android remote administration tool.

    • 888Rat family

    • Android 888 RAT payload

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Firewall

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks