• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  APT • Cybersecurity • Malware  /  CetaRAT APT Group – Targeting The Government Agencies
CetaRAT APT Group – Targeting The Government Agencies
19 October 2021

CetaRAT APT Group – Targeting The Government Agencies

Written by Prashant Tilekar
Prashant Tilekar
APT, Cybersecurity, Malware

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its activity since then. We have been tracking this RAT for a long time and observed an increase in targeting the Indian government agencies.

The CetaRAT infection chain starts with a Spear phishing mail with a malicious mail attachment. The attachment can be a zip file that downloads an HTA file from a remote, compromised URL. Once this HTA file is executed using mshta.exe, it drops and executes the CetaRAT payload that starts the CnC activity.

After HTA file execution, we observed two different behaviors:

In the first method, it creates & executes the JavaScript file at the “C:\\ProgramData” location. The script code opens the decoy document, which is related to government topics and notifications. At the same time, CetaRAT executable payload is dropped at the Startup location and, the script operation can sleep for some duration and restart the machine.

Fig 1. JavaScript code.
Fig 1. JavaScript code.

The second method observed, creating and running batch files at random name folder on C drive on the victim’s machine, which contains the instructions to add registry entry at “HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run” with the path of CetaRAT executable payload. In this variant, the executable is dropped at %AppData/Roaming% location.

Fig 2. Decoy document.
Fig 2. Decoy document.
Fig 3. Decoy document.
Fig 3. Decoy document.

The CetaRAT is C#-based RAT family which exfiltrates the data from the user and sends it to the CnC server. Once it is executed, first it will check the running AV product details from the machine with function Getans() and send details to the CnC server.

Fig 4. GetAV details from Machine.
Fig 4. GetAV details from Machine.

Function Start() uses the get details from machines like computer name, OS details, IP address, memory details, running processor, etc., and uploads it to CnC Server. This data is encrypted before uploading it to CnC.

Fig 5. Get all details from Machine.
Fig 5. Get all details from Machine.

In this RAT activity, the GetIP() function is used to get the running machine’s IP information. Here domain “checkip.dydnd.org” is used for this purpose. This function returns the machine IP address.

Fig 6. Get IP details.
Fig 6. Get IP details.

In the next activity, the RAT uses commands to exfiltrate the data and for file operations, below are commands details-

  • Download- use download data
  • Upload- Upload the data to the CnC server.
  • Downloadexe- it is used for download and then executing the file.
  • Created- for creating the directory on the system.
  • Rename- use for rename file
  • Delete- use for delete file or data.
  • Screen- take a screenshot of the system
  • Run- used for running the code.
  • Shellexe- used for executing the payload
  • Process- information of techniques.
  • Pkill- To kill the running process.
  • List- list of process.
Fig 7. Commands used to exfiltrate data.
Fig 7. Commands used to exfiltrate data.

After gathering information from use’s machine, CetaRAT uses RC4 algorithm for encryption of data before uploading to the CnC server.

Fig 8. Use RC4 encryption.
Fig 8. Use RC4 encryption.

Once the data is encrypted, it will exfiltrate to CnC server using POST HTTP method.  We can see three CnC server IPs mentioned in the code below, with a keyword “ceta”.

Fig 9. CnC servers.
Fig 9. CnC servers.
Fig 10. Wireshark capture traffic.
Fig 10. Wireshark capture traffic.

IOC-> (MD5)

HTA File-

  • 9DEF22BE73D2713600B689F3074F3841
  • 849CA729063AAAD53BC743A7D476C63E
  • 0BA023D0CD30E77001A78B4CBA017ADE

 

CetaRAT Payload-

  • 532ACBADB8151944650AAECC0A397965
  • 0058B40AEA4B981E0FC619250FC64EA3
  • 04213947D30FC4205A0C4D0674A27151

 

JS/Batch Payload-

  • 4B85ADE5E9790BDC63B80AD8EF853D40
  • 6F0672BBD0700AC61D1EDF201C4CABFF
  • 6DC67068A93E05A35E90CF066F33B79E

 

Decoy documents-

  • 5AA26DCD3CA84DB8963688BE491E8ABE
  • F509CF7605566EE74DE5AABF7FEF3C61

 

IPs-

  • 207.180.230.63
  • 164.68.104.126
  • 164.68.108.22

 

Conclusion

CetaRAT is Exfiltrating data that simply deliver mechanisms and aggressively infect the victim. It might leak sensitive data from a government organization, which impacts harmful activities in the countries. We recommend our customers not to access suspicious emails/attachments and keep their AV software up-to-date to protect their systems from such complex malware.

 Previous PostSeqrite Endpoint Security Cloud Supports Windows 11
Next Post  Multi-Staged JSOutProx RAT Targets Indian Co-Operative Banks and ...
Prashant Tilekar

About Prashant Tilekar

Prashant Tilekar is part of the HIPS (Host-based Intrusion Prevention System) team in Quick Heal Security Labs. He has worked on various security vulnerabilities...

Articles by Prashant Tilekar »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies