Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. RARSTONE

RARSTONE

RARSTONE is malware used by theNaikon group that has some characteristics similar toPlugX.[1]

ID: S0055
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1083File and Directory Discovery

RARSTONE obtains installer properties from Uninstall Registry Key entries to obtain information about installed applications and how to uninstall certain applications.[2]

EnterpriseT1105Ingress Tool Transfer

RARSTONE downloads its backdoor component from a C2 server and loads it directly into memory.[1]

EnterpriseT1095Non-Application Layer Protocol

RARSTONE uses SSL to encrypt its communication with its C2 server.[1]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

After decrypting itself in memory,RARSTONE downloads a DLL file from its C2 server and loads it in the memory space of a hidden Internet Explorer process. This "downloaded" file is actually not dropped onto the system.[2]

Groups That Use This Software

IDNameReferences
G0019Naikon

[3][4]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp