The RAT race: What happens when RATs go undetected
Dec. 2, 2024, 12:48 p.m.
Description
This analysis explores a sophisticated cyberattack attempt involving multiple Remote Access Tools (RATs) and a stealer. The attack chain begins with an email containing an exploit for CVE-2024-38213, bypassing Windows' Mark of the Web security feature. The malware uses WebDav directories and Cloudflare's free tunnel service to host and execute various RATs, including DcRAT, AsyncRAT, and XWorm, as well as the PureLog Stealer. The payloads are delivered through obfuscated batch files and compiled Python scripts, using memory-only execution techniques to evade detection. The attackers employ multiple C2 domains using the DuckDNS service, pointing to IP addresses in the U.S. The analysis highlights the importance of early threat detection in preventing potential ransomware deployment or data exfiltration.
Tags
Date
- Created: Nov. 30, 2024, 6:27 a.m.
- Published: Nov. 30, 2024, 6:27 a.m.
- Modified: Dec. 2, 2024, 12:48 p.m.
Attack Patterns
- PureLog Stealer
- DcRAT
- XWorm
- AsyncRAT
- T1036.002
- T1102.002
- T1036.004
- T1059.005
- T1553.005
- T1059.001
- T1547.001
- T1071.001
- T1204.002
- T1573
- T1105
- T1566.001
- T1219
- T1140
- T1027
- T1078