ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool RunningRAT

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: RunningRAT

NamesRunningRAT
Running RAT
running_rat
CategoryMalware
TypeReconnaissance, Backdoor, Keylogger, Info stealer
Description(McAfee) RunningRat is a remote access Trojan (RAT) that operates with two DLLs. It gets its name from a hardcoded string embedded in the malware. Upon being dropped onto a system, the first DLL executes. This DLL serves three main functions: killing antimalware, unpacking and executing the main RAT DLL, and obtaining persistence. The malware drops the Windows batch file dx.bat, which attempts to kill the task daumcleaner.exe; a Korean security program. The batch file then attempts to remove itself.
Information<https://www.mcafee.com/blogs/other-blogs/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/>
MITRE ATT&CK<https://attack.mitre.org/software/S0253/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.runningrat>

Last change to this tool card: 28 December 2022

Download this tool card in JSON format

All groups using tool RunningRAT

ChangedNameCountryObserved

APT groups

 HadesRussia2017-Oct 2020X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]