โš ๏ธ ๐—ก๐—ฒ๐˜„ ๐—ฆ๐˜๐—ฎ๐—ด๐—ฒ๐—ฟ ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด ๐˜๐—ผ ๐—ฅ๐—”๐—ง ๐——๐—ฒ๐—ฝ๐—น๐—ผ๐˜†๐—บ๐—ฒ๐—ป๐˜: ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜ ๐—œ๐˜ ๐—˜๐—ฎ๐—ฟ๐—น๐˜†
We caught #RUTSSTAGER, a malware that stores a DLL in the Windows registry in hexadecimal form, hiding the payload and delaying detection. In the observed chain, the stager delivered #OrcusRAT, followed by a supporting binary that maintains persistence, uses PowerShell for system checks, and restarts the RAT process.

โœ… In the #ANYRUN Sandbox, behavioral analysis and file system monitoring exposed the full execution chain. Process synchronization events revealed coordination between the stager and its payload, helping confirm multi-stage malware activity early.

๐Ÿ‘พ See the analysis session and collect #IOCs to speed up detection and response: https://app.any.run/tasks/b357aa61-29d5-4c7f-87f8-359281319a72/?utm_source=mastodon&utm_medium=post&utm_campaign=rutsstager&utm_term=050326&utm_content=linktoservice

๐Ÿ” Pivot from indicators and subscribe to Query Updates to proactively track evolving attacks: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=rutsstager&utm_content=linktotilookup&utm_term=050326#%7B%2522query%2522:%2522registryName:%255C%2522%5Erutsdll32$%255C%2522%2522,%2522dateRange%2522:180%7D

๐Ÿ‘จโ€๐Ÿ’ป Learn how #ANYRUN Sandbox helps SOCs detect complex threats and contain incidents faster: https://any.run/features/?utm_source=mastodon&utm_medium=post&utm_campaign=rutsstager&utm_term=050326&utm_content=linktosandboxlanding

Orcus RAT Author Charged in Malware Scheme - In July 2016, KrebsOnSecurity published a story identifying a Toronto man as the author of the Orcus... more: https://krebsonsecurity.com/2019/11/orcus-rat-author-charged-in-malware-scheme/ #royalcanadianmountedpolice #australianfederalpolice #orcustechnologies #neer-do-wellnews #taylorhuddleston #blackshadesrat #luminositylink #nanocorerat #johnrevesz #orcusrat #rcmp
Orcus RAT Author Charged in Malware Scheme โ€” Krebs on Security