HARDRAIN

Description

(US-CERT) This report provides analysis of three (3) malicious executable files. The first two (2) files are 32-bit Windows executables that function as Proxy servers and implement a ‘Fake TLS’ method similar to the behavior described in a previously published NCCIC report, MAR-10135536-B. The third file is an Executable Linkable Format (ELF) file designed to run on Android platforms as a fully functioning Remote Access Tool (RAT).

Names

Name
HARDRAIN

Category

Malware

Type

  • Backdoor
  • Tunneling

Information

Mitre Attack

Malpedia

Alienvault Otx

Other Information

Uuid

c8c2fb9c-d95d-4af7-9b76-bb911985b367

Last Card Change

2020-04-22