Overview
overview
10Static
static
3RootRAT.rar
windows7-x64
10RootRAT.rar
windows10-2004-x64
8RootRAT/Pl...am.dll
windows7-x64
3RootRAT/Pl...am.dll
windows10-2004-x64
8RootRAT/Plugin/ch.dll
windows7-x64
1RootRAT/Plugin/ch.dll
windows10-2004-x64
8RootRAT/Pl...ic.dll
windows7-x64
1RootRAT/Pl...ic.dll
windows10-2004-x64
8RootRAT/Pl...lg.dll
windows7-x64
3RootRAT/Pl...lg.dll
windows10-2004-x64
8RootRAT/Plugin/pw.dll
windows7-x64
3RootRAT/Plugin/pw.dll
windows10-2004-x64
8RootRAT/Pl...c2.dll
windows7-x64
1RootRAT/Pl...c2.dll
windows10-2004-x64
8RootRAT/Stub.ps1
windows7-x64
3RootRAT/Stub.ps1
windows10-2004-x64
8RootRAT/WinMM.Net.dll
windows7-x64
1RootRAT/WinMM.Net.dll
windows10-2004-x64
8RootRAT/nj...og.rtf
windows7-x64
4RootRAT/nj...og.rtf
windows10-2004-x64
8Resubmissions
14-02-2025 19:38
250214-ycpdzsxmck 1014-02-2025 19:38
250214-ycd81sxqav 814-02-2025 19:35
250214-yanpnsxlhn 10Analysis
-
max time kernel
93s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 19:35
Static task
static1
Behavioral task
behavioral1
Sample
RootRAT.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RootRAT.rar
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
RootRAT/Plugin/cam.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RootRAT/Plugin/cam.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
RootRAT/Plugin/ch.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RootRAT/Plugin/ch.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
RootRAT/Plugin/mic.dll
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
RootRAT/Plugin/mic.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
RootRAT/Plugin/plg.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
RootRAT/Plugin/plg.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral11
Sample
RootRAT/Plugin/pw.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
RootRAT/Plugin/pw.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral13
Sample
RootRAT/Plugin/sc2.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
RootRAT/Plugin/sc2.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
RootRAT/Stub.ps1
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
RootRAT/Stub.ps1
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
RootRAT/WinMM.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
RootRAT/WinMM.Net.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win10v2004-20250211-en
General
-
Target
RootRAT/Plugin/plg.dll
-
Size
28KB
-
MD5
0cbc2d9703feead9783439e551c2b673
-
SHA1
4f8f4addd6f9e60598a7f4a191a89a52201394a8
-
SHA256
ea9ecf8723788feef6492bf938cdfab1266a1558dffe75e1f78a998320f96e39
-
SHA512
06f55b542000e23f5eeba45ea5ff9ffaddddd102935e039e4496af5e5083f257129dab2f346eeae4ee864f54db57d3c73cf6ed1d3568087411203769cf0ddd66
-
SSDEEP
384:iLa+IgaVdBJfFfZsDNujglHdUky5P6bL2XIadYweVqJE+La7gmlweR9Oq7Bp2RhG:8ZIgYdbfAhdGJ6bL6YT2fO9vca2kSs
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 50 1028 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4376 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 756 wrote to memory of 4340 756 rundll32.exe 87 PID 756 wrote to memory of 4340 756 rundll32.exe 87 PID 756 wrote to memory of 4340 756 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RootRAT\Plugin\plg.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RootRAT\Plugin\plg.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4340
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDU3Mzg4NTQ0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4376