Overview
overview
8Static
static
3RootRAT/Pl...am.dll
windows10-2004-x64
8RootRAT/Plugin/ch.dll
windows10-2004-x64
8RootRAT/Pl...ic.dll
windows10-2004-x64
8RootRAT/Pl...lg.dll
windows10-2004-x64
8RootRAT/Plugin/pw.dll
windows10-2004-x64
8RootRAT/Pl...c2.dll
windows10-2004-x64
8RootRAT/Stub.ps1
windows10-2004-x64
8RootRAT/WinMM.Net.dll
windows10-2004-x64
8RootRAT/nj...og.rtf
windows10-2004-x64
8RootRAT/я...AT.exe
windows10-2004-x64
8Resubmissions
14-02-2025 19:38
250214-ycpdzsxmck 1014-02-2025 19:38
250214-ycd81sxqav 814-02-2025 19:35
250214-yanpnsxlhn 10Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 19:38
Static task
static1
Behavioral task
behavioral1
Sample
RootRAT/Plugin/cam.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral2
Sample
RootRAT/Plugin/ch.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
RootRAT/Plugin/mic.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral4
Sample
RootRAT/Plugin/plg.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
RootRAT/Plugin/pw.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral6
Sample
RootRAT/Plugin/sc2.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
RootRAT/Stub.ps1
Resource
win10v2004-20250211-en
Behavioral task
behavioral8
Sample
RootRAT/WinMM.Net.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win10v2004-20250211-en
Behavioral task
behavioral10
Sample
RootRAT/яσσтRAT.exe
Resource
win10v2004-20250207-en
General
-
Target
RootRAT/Plugin/cam.dll
-
Size
63KB
-
MD5
a73edb60b80a2dfa86735d821bea7b19
-
SHA1
f39a54d7bc25425578a2b800033e4508714a73ed
-
SHA256
7a4977b024d048b71bcc8f1cc65fb06e4353821323f852dc6740b79b9ab75c98
-
SHA512
283e9206d0b56c1f8b0741375ccd0a184410cf89f5f42dfe91e7438c5fd0ac7fa4afbb84b8b7ea448b3093397552fd3731b9be74c67b846d946da486dcf0df68
-
SSDEEP
1536:7EoML5LFXbUu5ExN3hep+cx4sKcuxpSe:7ERZxQxep+cx5Kcu3
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 41 1456 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2468 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 3756 4076 rundll32.exe 88 PID 4076 wrote to memory of 3756 4076 rundll32.exe 88 PID 4076 wrote to memory of 3756 4076 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RootRAT\Plugin\cam.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RootRAT\Plugin\cam.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDk3Mjc5MjMxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2468