Overview
overview
10Static
static
3RootRAT.rar
windows7-x64
10RootRAT.rar
windows10-2004-x64
8RootRAT/Pl...am.dll
windows7-x64
3RootRAT/Pl...am.dll
windows10-2004-x64
8RootRAT/Plugin/ch.dll
windows7-x64
1RootRAT/Plugin/ch.dll
windows10-2004-x64
8RootRAT/Pl...ic.dll
windows7-x64
1RootRAT/Pl...ic.dll
windows10-2004-x64
8RootRAT/Pl...lg.dll
windows7-x64
3RootRAT/Pl...lg.dll
windows10-2004-x64
8RootRAT/Plugin/pw.dll
windows7-x64
3RootRAT/Plugin/pw.dll
windows10-2004-x64
8RootRAT/Pl...c2.dll
windows7-x64
1RootRAT/Pl...c2.dll
windows10-2004-x64
8RootRAT/Stub.ps1
windows7-x64
3RootRAT/Stub.ps1
windows10-2004-x64
8RootRAT/WinMM.Net.dll
windows7-x64
1RootRAT/WinMM.Net.dll
windows10-2004-x64
8RootRAT/nj...og.rtf
windows7-x64
4RootRAT/nj...og.rtf
windows10-2004-x64
8Resubmissions
14-02-2025 19:38
250214-ycpdzsxmck 1014-02-2025 19:38
250214-ycd81sxqav 814-02-2025 19:35
250214-yanpnsxlhn 10Analysis
-
max time kernel
115s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 19:35
Static task
static1
Behavioral task
behavioral1
Sample
RootRAT.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RootRAT.rar
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
RootRAT/Plugin/cam.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RootRAT/Plugin/cam.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
RootRAT/Plugin/ch.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RootRAT/Plugin/ch.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
RootRAT/Plugin/mic.dll
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
RootRAT/Plugin/mic.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
RootRAT/Plugin/plg.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
RootRAT/Plugin/plg.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral11
Sample
RootRAT/Plugin/pw.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
RootRAT/Plugin/pw.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral13
Sample
RootRAT/Plugin/sc2.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
RootRAT/Plugin/sc2.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
RootRAT/Stub.ps1
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
RootRAT/Stub.ps1
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
RootRAT/WinMM.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
RootRAT/WinMM.Net.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win10v2004-20250211-en
General
-
Target
RootRAT/Plugin/cam.dll
-
Size
63KB
-
MD5
a73edb60b80a2dfa86735d821bea7b19
-
SHA1
f39a54d7bc25425578a2b800033e4508714a73ed
-
SHA256
7a4977b024d048b71bcc8f1cc65fb06e4353821323f852dc6740b79b9ab75c98
-
SHA512
283e9206d0b56c1f8b0741375ccd0a184410cf89f5f42dfe91e7438c5fd0ac7fa4afbb84b8b7ea448b3093397552fd3731b9be74c67b846d946da486dcf0df68
-
SSDEEP
1536:7EoML5LFXbUu5ExN3hep+cx4sKcuxpSe:7ERZxQxep+cx5Kcu3
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 45 4268 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2832 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2572 2760 rundll32.exe 87 PID 2760 wrote to memory of 2572 2760 rundll32.exe 87 PID 2760 wrote to memory of 2572 2760 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RootRAT\Plugin\cam.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RootRAT\Plugin\cam.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OEI1NTgyQTEtQTYwMS00RkM3LTg3QzItREI3NDFBMjYwNzIwfSIgdXNlcmlkPSJ7NjNDQTBCRDEtRURFRS00ODAyLTk1NjEtMjlFODMzOEM0NUJEfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NENBRDkzMkItMTZCMi00M0JCLThFQzEtNjgzMzJGMjNENDcyfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDQxODcyODIyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2832