๐จ ๐จ๐ฝ๐ฑ๐ฎ๐๐ฒ ๐ฌ๐ผ๐๐ฟ ๐๐ฒ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ฅ๐๐น๐ฒ๐: ๐ก๐ฒ๐ ๐ฅ๐ฒ๐บ๐ผ๐๐ฒ ๐๐ฐ๐ฐ๐ฒ๐๐ ๐ง๐ฟ๐ผ๐ท๐ฎ๐ป
We caught a Go-based RAT and named it #Moonrise. At the time of the analysis, the sample had not yet been submitted to VirusTotal โ๏ธ
The level of access enables credential harvesting, sensitive data collection, and preparation for further compromise without triggering static detections, leaving SOCs with no clear signals to act on.
โ ๏ธ Observed capabilities include:
๐น Privilege-related functions and persistence mechanisms
๐น Data theft and credential harvesting
๐น Process control and command execution
๐น File upload and execution
๐น User activity monitoring: screen capture and streaming, webcam and microphone access, keystroke logging, clipboard monitoring
One compromised endpoint can disrupt operations and lead to financial and reputational damage.
๐พ See sample execution in a live analysis session: https://app.any.run/tasks/d3e5e733-3b0d-4cf7-a7a8-ea1553cd16b9/?utm_source=mastodon&utm_medium=post&utm_campaign=moonrise&utm_term=180226&utm_content=linktoservice
โ Behavior-first triage in #ANYRUN Sandbox lets security teams confirm attacker actions, like remote command execution, UAC bypass attempts, and persistence-related activity, within minutes. Security teams reduce Tier-1 overload and unnecessary escalations, while containing incidents earlier.
๐จโ๐ป Equip your SOC with faster decisions and lower workload. See how #ANYRUN fits your workflows: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=moonrise&utm_term=180226&utm_content=linktoenterpriselanding
#ExploreWithANYRUN
IOCs:
193[.]23[.]199[.]88
c7fd265b23b2255729eed688a211f8c3bd2192834c00e4959d1f17a0b697cd5e
8a422b8c4c6f9a183848f8d3d95ace69abb870549b593c080946eaed9e5457ad
7609c7ab10f9ecc08824db6e3c3fa5cbdd0dff2555276e216abe9eebfb80f59b
Ed5471d42bef6b32253e9c1aba49b01b8282fd096ad0957abcf1a1e27e8f7551
082fdd964976afa6f9c5d8239f74990b24df3dfa0c95329c6e9f75d33681b9f4
8d7c1bbdb6a8bf074db7fc1185ffd59af0faffb08e0eb46a373c948147787268












