ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > RATicate

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: RATicate

NamesRATicate (Sophos)
MotivationInformation theft and espionage
First seen2019
Description(Sophos) In a series of malspam campaigns dating back to November of 2019, an unidentified group sent out waves of installers that drop remote administration tool (RAT) and information stealing malware on victims’ computers.

We’ve identified five separate campaigns between November, 2019 and January, 2020 in which the payloads used similar packing code and pointed to the same command and control (C&C) infrastructure. The campaigns targeted industrial companies in Europe, the Middle East, and the Republic of Korea. This leads us to believe that they are all the work of the same actors—a group we’ve dubbed RATicate.

A new campaign we believe connected to the same actors leverages concern about the global COVID-19 pandemic to convince victims to open the payloads. This is a shift in tactics, but we suspect that this group constantly changes the way they deploy malware—and that the group has conducted campaigns prior to this past November.
ObservedSectors: Industrial, Manufacturing, Media, Telecommunications.
Countries: Romania, Japan, Kuwait, South Korea, Switzerland, UK and Europe and Middle East.
Tools usedAgent Tesla, BetaBot, BlackRAT, Formbook, GuLoader, LokiBot, NetWire RC, njRAT, NSIS, RemcosRAT.

Last change to this card: 15 July 2020

Download this actor card in PDF or JSON format

Previous: Rancor
Next: Razor Tiger

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]