SombRAT

SombRAT is a modular backdoor written in C++ that has been used since at least 2019 to download and execute malicious payloads, including FIVEHANDS ransomware.[1][2][3]

ID: S0615
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 26 May 2021
Last Modified: 05 October 2022

Techniques Used

Domain ID Name Use
Enterprise T1071 .004 Application Layer Protocol: DNS

SombRAT can communicate over DNS with the C2 server.[1][2]

Enterprise T1560 .003 Archive Collected Data: Archive via Custom Method

SombRAT has encrypted collected data with AES-256 using a hardcoded key.[1]

Enterprise T1005 Data from Local System

SombRAT has collected data and files from a compromised host.[1][3]

Enterprise T1074 .001 Data Staged: Local Data Staging

SombRAT can store harvested data in a custom database under the %TEMP% directory.[1]

Enterprise T1140 Deobfuscate/Decode Files or Information

SombRAT can run upload to decrypt and upload files from storage.[1][3]

Enterprise T1568 .002 Dynamic Resolution: Domain Generation Algorithms

SombRAT can use a custom DGA to generate a subdomain for C2.[1]

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

SombRAT has encrypted its C2 communications with AES.[1]

.002 Encrypted Channel: Asymmetric Cryptography

SombRAT can SSL encrypt C2 traffic.[1][2][3]

Enterprise T1041 Exfiltration Over C2 Channel

SombRAT has uploaded collected data and files from a compromised host to its C2 server.[1]

Enterprise T1083 File and Directory Discovery

SombRAT can execute enum to enumerate files in storage on a compromised system.[1]

Enterprise T1564 .010 Hide Artifacts: Process Argument Spoofing

SombRAT has the ability to modify its process memory to hide process command-line arguments.[2]

Enterprise T1070 .004 Indicator Removal: File Deletion

SombRAT has the ability to run cancel or closeanddeletestorage to remove all files from storage and delete the storage temp file on a compromised host.[1]

Enterprise T1105 Ingress Tool Transfer

SombRAT has the ability to download and execute additional payloads.[1][2][3]

Enterprise T1036 Masquerading

SombRAT can use a legitimate process name to hide itself.[3]

Enterprise T1106 Native API

SombRAT has the ability to respawn itself using ShellExecuteW and CreateProcessW.[1]

Enterprise T1095 Non-Application Layer Protocol

SombRAT has the ability to use TCP sockets to send data and ICMP to ping the C2 server.[1][2]

Enterprise T1027 Obfuscated Files or Information

SombRAT can encrypt strings with XOR-based routines and use a custom AES storage format for plugins, configuration, C2 domains, and harvested data.[1][2][3]

Enterprise T1057 Process Discovery

SombRAT can use the getprocesslist command to enumerate processes on a compromised host.[1][2][3]

Enterprise T1055 .001 Process Injection: Dynamic-link Library Injection

SombRAT can execute loadfromfile, loadfromstorage, and loadfrommem to inject a DLL from disk, storage, or memory respectively.[1]

Enterprise T1090 Proxy

SombRAT has the ability to use an embedded SOCKS proxy in C2 communications.[3]

Enterprise T1082 System Information Discovery

SombRAT can execute getinfo to enumerate the computer name and OS version of a compromised system.[1]

Enterprise T1033 System Owner/User Discovery

SombRAT can execute getinfo to identify the username on a compromised host.[1][3]

Enterprise T1007 System Service Discovery

SombRAT can enumerate services on a victim machine.[1]

Enterprise T1124 System Time Discovery

SombRAT can execute getinfo to discover the current time on a compromised host.[1][3]

Campaigns

ID Name Description
C0004 CostaRicto

During CostaRicto, threat actors used SombRAT in conjuction with CostaBricks and PowerSploit.[1]

References