The RAT race: What happens when RATs go undetected
Dec. 2, 2024, 12:48 p.m.
Tags
External References
Description
This analysis explores a sophisticated cyberattack attempt involving multiple Remote Access Tools (RATs) and a stealer. The attack chain begins with an email containing an exploit for CVE-2024-38213, bypassing Windows' Mark of the Web security feature. The malware uses WebDav directories and Cloudflare's free tunnel service to host and execute various RATs, including DcRAT, AsyncRAT, and XWorm, as well as the PureLog Stealer. The payloads are delivered through obfuscated batch files and compiled Python scripts, using memory-only execution techniques to evade detection. The attackers employ multiple C2 domains using the DuckDNS service, pointing to IP addresses in the U.S. The analysis highlights the importance of early threat detection in preventing potential ransomware deployment or data exfiltration.
Date
Published: Nov. 30, 2024, 6:27 a.m.
Created: Nov. 30, 2024, 6:27 a.m.
Modified: Dec. 2, 2024, 12:48 p.m.
Attack Patterns
PureLog Stealer
DcRAT
XWorm
AsyncRAT
T1036.002
T1102.002
T1036.004
T1059.005
T1553.005
T1059.001
T1547.001
T1071.001
T1204.002
T1573
T1105
T1566.001
T1219
T1140
T1027
T1078