ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Orat

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Orat

NamesOrat
CategoryMalware
TypeLoader
Description(SecureWorks) CTU researchers have only observed this basic loader tool in the context of BRONZE PRESIDENT intrusions. ORat is the name assigned by the malware author, as denoted by the program debug database string in the analyzed sample: D:\vswork\Plugin\ORat\build\Release\ORatServer\Loader.pdb. The tool uses the Windows Management Instrumentation (WMI) event consumer for persistence by installing a script to the system's WMI registry. Messages sent from ORat to its command and control (C2) server start with the string 'VIEWS0018x'. If the data received from the C2 server starts with the same string, then the remainder of the payload is decompressed using ORat's 'deflate' algorithm and called as a function. ORat acts as a flexible loader tool rather than a fully featured remote access tool.
Information<https://www.secureworks.com/research/bronze-president-targets-ngos>

Last change to this tool card: 04 April 2022

Download this tool card in JSON format

All groups using tool Orat

ChangedNameCountryObserved

APT groups

XMustang Panda, Bronze PresidentChina2014-Mar 2022 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]