RotBot

Description

(Talos) RotBot, the QuasarRAT client variant, in its initial execution phase, performs several detection evasion checks on the victim machine and conducts system reconnaissance. RotBot then connects to a host on a legitimate domain, likely controlled by the threat actor, and downloads the configuration file for the RotBot to connect to the C2. CoralRaider uses the Telegram bot as the C2 channel in this campaign.

Names

Name
RotBot

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Keylogger
  • Credential stealer
  • Info stealer
  • Exfiltration
  • Tunneling

Information

Other Information

Uuid

91ca3e5f-03e7-47da-bf4b-b1d8832ae694

Last Card Change

2024-06-18