Rancor

Description

(Palo Alto) Throughout 2017 and 2018 Unit 42 has been tracking and observing a series of highly targeted attacks focused in South East Asia, building on our research into the KHRAT Trojan. Based on the evidence, these attacks appear to be conducted by the same set of attackers using previously unknown malware families. In addition, these attacks appear to be highly targeted in their distribution of the malware used, as well as the targets chosen. Based on these factors, Unit 42 believes the attackers behind these attacks are conducting their campaigns for espionage purposes.

We believe this group is previously unidentified and therefore have we have dubbed it “Rancor”. The Rancor group’s attacks use two primary malware families which we describe in depth later in this blog and are naming DDKONG and PLAINTEE. DDKONG is used throughout the campaign and PLAINTEE appears to be new addition to these attackers’ toolkit.

Kaspersky found connections between this group and DragonOK.

Names

NameName-Giver
RancorPalo Alto
Rancor GroupPalo Alto
Rancor TaurusPalo Alto

Country

Motivation

  • Information theft and espionage

First Seen

2017

Observed Sectors

Observed Countries

Tools

Information

Mitre Attack

Playbook

Other Information

Uuid

020d538c-5250-46d8-9713-e739536cdd7e

Last Card Change

2024-03-10