RDAT

RDAT is a backdoor used by the suspected Iranian threat group OilRig. RDAT was originally identified in 2017 and targeted companies in the telecommunications sector.[1]

ID: S0495
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 28 July 2020
Last Modified: 15 October 2020

Techniques Used

Domain ID Name Use
Enterprise T1036 .004 伪装: Masquerade Task or Service

RDAT has used Windows Video Service as a name for malicious services.[1]

.005 伪装: Match Legitimate Name or Location

RDAT has masqueraded as VMware.exe.[1]

Enterprise T1543 .003 创建或修改系统进程: Windows Service

RDAT has created a service when it is installed on the victim machine.[1]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

RDAT has used AES ciphertext to encode C2 communications.[1]

Enterprise T1140 反混淆/解码文件或信息

RDAT can deobfuscate the base64-encoded and AES-encrypted files downloaded from the C2 server.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

RDAT has executed commands using cmd.exe /c.[1]

Enterprise T1008 回退信道

RDAT has used HTTP if DNS C2 communications were not functioning.[1]

Enterprise T1113 屏幕捕获

RDAT can take a screenshot on the infected system.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

RDAT can use HTTP communications for C2, as well as using the WinHTTP library to make requests to the Exchange Web Services API.[1]

.003 应用层协议: Mail Protocols

RDAT can use email attachments for C2 communications.[1]

.004 应用层协议: DNS

RDAT has used DNS to communicate with the C2.[1]

Enterprise T1030 数据传输大小限制

RDAT can upload a file via HTTP POST response to the C2 split into 102,400-byte portions. RDAT can also download data from the C2 which is split into 81,920-byte portions.[1]

Enterprise T1001 数据混淆

RDAT has used encoded data within subdomains as AES ciphertext to communicate from the host to the C2.[1]

.002 Steganography

RDAT can process steganographic images attached to email messages to send and receive C2 commands. RDAT can also embed additional messages within BMP images to communicate with the RDAT operator.[1]

Enterprise T1132 .001 数据编码: Standard Encoding

RDAT can communicate with the C2 via base32-encoded subdomains.[1]

.002 数据编码: Non-Standard Encoding

RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions.[1]

Enterprise T1027 .003 混淆文件或信息: Steganography

RDAT can also embed data within a BMP image prior to exfiltration.[1]

Enterprise T1070 .004 移除指标: File Deletion

RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system.[1]

Enterprise T1105 输入工具传输

RDAT can download files via DNS.[1]

Enterprise T1041 通过C2信道渗出

RDAT can exfiltrate data gathered from the infected system via the established Exchange Web Services API C2 channel.[1]

Groups That Use This Software

ID Name References
G0049 OilRig

[1]

References