Today > 1 Critical | 2 High | 2 Medium vulnerabilities   -   You can now download lists of IOCs here!

The RAT race: What happens when RATs go undetected

Dec. 2, 2024, 12:48 p.m.

Description

This analysis explores a sophisticated cyberattack attempt involving multiple Remote Access Tools (RATs) and a stealer. The attack chain begins with an email containing an exploit for CVE-2024-38213, bypassing Windows' Mark of the Web security feature. The malware uses WebDav directories and Cloudflare's free tunnel service to host and execute various RATs, including DcRAT, AsyncRAT, and XWorm, as well as the PureLog Stealer. The payloads are delivered through obfuscated batch files and compiled Python scripts, using memory-only execution techniques to evade detection. The attackers employ multiple C2 domains using the DuckDNS service, pointing to IP addresses in the U.S. The analysis highlights the importance of early threat detection in preventing potential ransomware deployment or data exfiltration.

Date

Published: Nov. 30, 2024, 6:27 a.m.

Created: Nov. 30, 2024, 6:27 a.m.

Modified: Dec. 2, 2024, 12:48 p.m.

Attack Patterns

PureLog Stealer

DcRAT

XWorm

AsyncRAT

T1036.002

T1102.002

T1036.004

T1059.005

T1553.005

T1059.001

T1547.001

T1071.001

T1204.002

T1573

T1105

T1566.001

T1219

T1140

T1027

T1078