ObliqueRAT

Malware updated 4 months ago (2024-05-04T19:36:02.835Z)
Download STIX
Preview STIX
ObliqueRAT is a harmful malware that can infect computer systems through suspicious downloads, emails, or websites, often without the user's knowledge. Attackers leveraging ObliqueRAT have started hosting their malicious payloads on compromised websites to appear more legitimate. The group behind the malware was primarily targeting military and defense personnel but has recently expanded to diplomatic entities, defense contractors, research organizations, and conference attendees. Transparent Tribe, the group behind ObliqueRAT, has not changed its tactics, techniques, and procedures since 2020 but continues to implement new lures into its operational toolkit. The latest version of ObliqueRAT contains minor changes and no longer includes the "backed" command. Malicious macros are responsible for extracting the ZIP and subsequently the ObliqueRAT payload on the endpoint. In early 2021, adversaries used the Indian Industries Association's legitimate website to host ObliqueRAT artifacts. These new maldocs do not contain the ObliqueRAT payload directly embedded in the maldoc, as observed in previous campaigns. The malware can split large files of interest into smaller chunks to prepare them for exfiltration.
Description last updated: 2023-06-23T14:27:56.600Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the ObliqueRAT Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
Transparent Tribe begins targeting education sector in latest campaign
MITRE
2 years ago
Transparent Tribe APT expands its Windows malware arsenal
MITRE
2 years ago
ObliqueRAT returns with new campaign using hijacked websites