RDAT

Description

(Palo Alto) The adversaries compiled the RDAT payloads used in the attacks on the Middle Eastern telecommunications organization on March 1, 2020, and configured it to use a domain provided on the command line or the hardcoded domain rsshay[.]com as its C2 server. Unlike previous RDAT samples, this particular sample only uses DNS tunneling for its C2 communications with no HTTP fallback channel. This RDAT sample can only use TXT queries in its DNS tunnel.

Names

Name
RDAT
GREYSTUFF

Category

Malware

Type

  • Backdoor
  • Tunneling

Information

Mitre Attack

Malpedia

Alienvault Otx

Other Information

Uuid

52268b11-5917-4022-a87a-3cb14973ccb0

Last Card Change

2022-12-30