Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Moonrise RAT
ID: 48396eec7b4adc6bf620a111588d377e53789
Crimeware
RAT
Trojan
Threat types: Malware, Remote Access Trojan, Data Theft
Progress: 67%
Completeness: 66%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| Moonrise | MoonriseRAT | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium-high
Moonrise RAT is a Go-based remote access trojan publicly documented in Feb 2026 with rapid WebSocket-based C2 establishment and a broad operator command set. Observed behavior includes masquerading (svchost.exe in a user Temp directory), persistence via a Startup VBS script (WindowsService.vbs), host enumeration (process/file/monitor/webcam lists), remote command execution (cmd and PowerShell), file upload and execution, keylogging, clipboard monitoring, and screen/webcam/microphone capture. A public sandbox report shows C2 traffic to 193.23.199.88:8765 with a WebSocket upgrade. Treat infrastructure indicators as time-bounded and prioritize behavioral pivots for durable detection.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 | |
| T1071.001 | Web Protocols | TA0011 |
|
| T1059.003 | Windows Command Shell | TA0002 | |
| T1059.001 | PowerShell | TA0002 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1056.001 | Keylogging | TA0006 TA0009 |
|
| T1115 | Clipboard Data | TA0009 |
|
| T1113 | Screen Capture | TA0009 | |
| T1125 | Video Capture | TA0009 |
|
| T1123 | Audio Capture | TA0009 |
|
| T1489 | Service Stop | TA0040 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.