Skip to content

Hide Navigation Hide TOC

Ratankba (64b3c66b-fc70-4b5a-83a9-866cde2ccb0b)

In one instance we observed, one of the initial malware delivered to the victim, RATANKBA, connects to a legitimate but compromised website from which a hack tool (nbt_scan.exe) is also downloaded. The domain also serves as one of the campaign’s platform for C&C communication. The threat actor uses RATANKBA to survey the lay of the land as it looks into various aspects of the host machine where it has been initially downloaded—the machine that has been victim of the watering hole attack. Information such as the running tasks, domain, shares, user information, if the host has default internet connectivity, and so forth.

Cluster A Galaxy A Cluster B Galaxy B Level
Ratankba (64b3c66b-fc70-4b5a-83a9-866cde2ccb0b) Tool Ratankba (eead20f5-6a30-4700-8d14-cfb2d42eaff0) Malpedia 1