Names | Orat | |
Category | Malware | |
Type | Loader | |
Description | (SecureWorks) CTU researchers have only observed this basic loader tool in the context of BRONZE PRESIDENT intrusions. ORat is the name assigned by the malware author, as denoted by the program debug database string in the analyzed sample: D:\vswork\Plugin\ORat\build\Release\ORatServer\Loader.pdb. The tool uses the Windows Management Instrumentation (WMI) event consumer for persistence by installing a script to the system's WMI registry. Messages sent from ORat to its command and control (C2) server start with the string 'VIEWS0018x'. If the data received from the C2 server starts with the same string, then the remainder of the payload is decompressed using ORat's 'deflate' algorithm and called as a function. ORat acts as a flexible loader tool rather than a fully featured remote access tool. | |
Information | <https://www.secureworks.com/research/bronze-president-targets-ngos> |
Last change to this tool card: 04 April 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Mustang Panda, Bronze President | 2012-Mar 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |