ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool RDAT

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: RDAT

NamesRDAT
GREYSTUFF
CategoryMalware
TypeBackdoor, Tunneling
Description(Palo Alto) The adversaries compiled the RDAT payloads used in the attacks on the Middle Eastern telecommunications organization on March 1, 2020, and configured it to use a domain provided on the command line or the hardcoded domain rsshay[.]com as its C2 server. Unlike previous RDAT samples, this particular sample only uses DNS tunneling for its C2 communications with no HTTP fallback channel. This RDAT sample can only use TXT queries in its DNS tunnel.
Information<https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/>
<https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020OverWatchNowheretoHide.pdf>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.rdat>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:rdat>

Last change to this tool card: 23 April 2021

Download this tool card in JSON format

Previous: Rdasrv
Next: RDFSNIFFER

All groups using tool RDAT

ChangedNameCountryObserved

APT groups

 OilRig, APT 34, Helix Kitten, ChryseneIran2014-Jan 2021X

1 group listed (1 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key