Overview
overview
10Static
static
3RootRAT.rar
windows7-x64
10RootRAT.rar
windows10-2004-x64
8RootRAT/Pl...am.dll
windows7-x64
3RootRAT/Pl...am.dll
windows10-2004-x64
8RootRAT/Plugin/ch.dll
windows7-x64
1RootRAT/Plugin/ch.dll
windows10-2004-x64
8RootRAT/Pl...ic.dll
windows7-x64
1RootRAT/Pl...ic.dll
windows10-2004-x64
8RootRAT/Pl...lg.dll
windows7-x64
3RootRAT/Pl...lg.dll
windows10-2004-x64
8RootRAT/Plugin/pw.dll
windows7-x64
3RootRAT/Plugin/pw.dll
windows10-2004-x64
8RootRAT/Pl...c2.dll
windows7-x64
1RootRAT/Pl...c2.dll
windows10-2004-x64
8RootRAT/Stub.ps1
windows7-x64
3RootRAT/Stub.ps1
windows10-2004-x64
8RootRAT/WinMM.Net.dll
windows7-x64
1RootRAT/WinMM.Net.dll
windows10-2004-x64
8RootRAT/nj...og.rtf
windows7-x64
4RootRAT/nj...og.rtf
windows10-2004-x64
8Resubmissions
14-02-2025 19:38
250214-ycpdzsxmck 1014-02-2025 19:38
250214-ycd81sxqav 814-02-2025 19:35
250214-yanpnsxlhn 10Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-02-2025 19:35
Static task
static1
Behavioral task
behavioral1
Sample
RootRAT.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RootRAT.rar
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
RootRAT/Plugin/cam.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RootRAT/Plugin/cam.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
RootRAT/Plugin/ch.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RootRAT/Plugin/ch.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
RootRAT/Plugin/mic.dll
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
RootRAT/Plugin/mic.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
RootRAT/Plugin/plg.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
RootRAT/Plugin/plg.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral11
Sample
RootRAT/Plugin/pw.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
RootRAT/Plugin/pw.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral13
Sample
RootRAT/Plugin/sc2.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
RootRAT/Plugin/sc2.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
RootRAT/Stub.ps1
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
RootRAT/Stub.ps1
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
RootRAT/WinMM.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
RootRAT/WinMM.Net.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win10v2004-20250211-en
General
-
Target
RootRAT/Plugin/pw.dll
-
Size
251KB
-
MD5
872401528fc94c90f3de6658e776cc36
-
SHA1
c58e22158774d16831350de79eb4e1711379e8a6
-
SHA256
3a1cc072effd8c38406a6fddf4d8f49c5366bb0e32071311d90db669940987ce
-
SHA512
6da881fb968ba9d9200777a9f19d69220468482f3eaaf687c433790d512da520f5adb23441fdc8f3fd10785918eb2864ea3ef32ddb80d2f6665550ea455f4a2f
-
SSDEEP
6144:/e31bXJVFJmShoCKFdZ3aDGjXsCUjguhyUOMO1:WxJ/JmSG9T8CEgdM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1648 2628 rundll32.exe 30 PID 2628 wrote to memory of 1648 2628 rundll32.exe 30 PID 2628 wrote to memory of 1648 2628 rundll32.exe 30 PID 2628 wrote to memory of 1648 2628 rundll32.exe 30 PID 2628 wrote to memory of 1648 2628 rundll32.exe 30 PID 2628 wrote to memory of 1648 2628 rundll32.exe 30 PID 2628 wrote to memory of 1648 2628 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RootRAT\Plugin\pw.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RootRAT\Plugin\pw.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1648
-