General

  • Target

    ServerListPlus-3.5.0-Universal.jar

  • Size

    784KB

  • Sample

    250208-zpe7hssrbw

  • MD5

    4002d830f46e36f8d6ade80eb73361bb

  • SHA1

    2d5c976d826604e7eb598ce763ad65db7de66f9c

  • SHA256

    0f416351341b3242f0d6576d25eab21c5268afc3ce8bfd523c4fa43b8e012844

  • SHA512

    0c2b5d74e4415c018d896ca6e05c2a091b61d0a1868c299288418687e4ba719ec68f1f963a30436d4dd798db52fc09bd375baebfa3448bf24ea7745530ff1327

  • SSDEEP

    12288:ZJdfY6vr/SWvyvx38VDmiQdy10pQrukDmZEvQvqNPuNQVrTc1pv:ZJtNKWKvOFmiZ10hkDDIyNVrTc1pv

Malware Config

Targets

    • Target

      ServerListPlus-3.5.0-Universal.jar

    • Size

      784KB

    • MD5

      4002d830f46e36f8d6ade80eb73361bb

    • SHA1

      2d5c976d826604e7eb598ce763ad65db7de66f9c

    • SHA256

      0f416351341b3242f0d6576d25eab21c5268afc3ce8bfd523c4fa43b8e012844

    • SHA512

      0c2b5d74e4415c018d896ca6e05c2a091b61d0a1868c299288418687e4ba719ec68f1f963a30436d4dd798db52fc09bd375baebfa3448bf24ea7745530ff1327

    • SSDEEP

      12288:ZJdfY6vr/SWvyvx38VDmiQdy10pQrukDmZEvQvqNPuNQVrTc1pv:ZJtNKWKvOFmiZ10hkDDIyNVrTc1pv

    • Ratty

      Ratty is an open source Java Remote Access Tool.

    • Ratty Rat payload

    • Ratty family

    • Downloads MZ/PE file

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks