Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. RDAT

RDAT

RDAT is a backdoor used by the suspected Iranian threat groupOilRig.RDAT was originally identified in 2017 and targeted companies in the telecommunications sector.[1]

ID: S0495
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 28 July 2020
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

RDAT can use HTTP communications for C2, as well as using the WinHTTP library to make requests to the Exchange Web Services API.[1]

.003Application Layer Protocol:Mail Protocols

RDAT can use email attachments for C2 communications.[1]

.004Application Layer Protocol:DNS

RDAT has used DNS to communicate with the C2.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

RDAT has executed commands usingcmd.exe /c.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

RDAT has created a service when it is installed on the victim machine.[1]

EnterpriseT1132.001Data Encoding:Standard Encoding

RDAT can communicate with the C2 via base32-encoded subdomains.[1]

.002Data Encoding:Non-Standard Encoding

RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions.[1]

EnterpriseT1001Data Obfuscation

RDAT has used encoded data within subdomains as AES ciphertext to communicate from the host to the C2.[1]

.002Steganography

RDAT can process steganographic images attached to email messages to send and receive C2 commands.RDAT can also embed additional messages within BMP images to communicate with theRDAT operator.[1]

EnterpriseT1030Data Transfer Size Limits

RDAT can upload a file via HTTP POST response to the C2 split into 102,400-byte portions.RDAT can also download data from the C2 which is split into 81,920-byte portions.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

RDAT can deobfuscate the base64-encoded and AES-encrypted files downloaded from the C2 server.[1]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

RDAT has used AES ciphertext to encode C2 communications.[1]

EnterpriseT1041Exfiltration Over C2 Channel

RDAT can exfiltrate data gathered from the infected system via the established Exchange Web Services API C2 channel.[1]

EnterpriseT1008Fallback Channels

RDAT has used HTTP if DNS C2 communications were not functioning.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

RDAT can issue SOAP requests to delete already processed C2 emails.RDAT can also delete itself from the infected system.[1]

EnterpriseT1105Ingress Tool Transfer

RDAT can download files via DNS.[1]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

RDAT has used Windows Video Service as a name for malicious services.[1]

.005Masquerading:Match Legitimate Resource Name or Location

RDAT has masqueraded as VMware.exe.[1]

EnterpriseT1027.003Obfuscated Files or Information:Steganography

RDAT can also embed data within a BMP image prior to exfiltration.[1]

EnterpriseT1113Screen Capture

RDAT can take a screenshot on the infected system.[1]

Groups That Use This Software

IDNameReferences
G0049OilRig

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp