General

  • Target

    cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13.lnk

  • Size

    52.0MB

  • Sample

    240223-f95s5ace79

  • MD5

    acf4085b2fa977fc1350f0ddc2710502

  • SHA1

    7155d89bae9acd67f5d8cdf651b73ee6b54262c3

  • SHA256

    cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13

  • SHA512

    4aa010f680485f0241cbaff77d3a21509e2f73c4fdfe1940aa63f46949fcb39404e4a2c543c465098806b7059fab234de48fe9996ba1edd9c4a9b7b6ca1dbe70

  • SSDEEP

    24576:0Zthnqtka+Dj8bI6c94TuDjoZgRXTTYdy830QtO0oIJjW7sFAc1Mh5D2y8:U9OQj85c91wZgjbaJa7d2y8

Score
10/10

Malware Config

Targets

    • Target

      cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13.lnk

    • Size

      52.0MB

    • MD5

      acf4085b2fa977fc1350f0ddc2710502

    • SHA1

      7155d89bae9acd67f5d8cdf651b73ee6b54262c3

    • SHA256

      cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13

    • SHA512

      4aa010f680485f0241cbaff77d3a21509e2f73c4fdfe1940aa63f46949fcb39404e4a2c543c465098806b7059fab234de48fe9996ba1edd9c4a9b7b6ca1dbe70

    • SSDEEP

      24576:0Zthnqtka+Dj8bI6c94TuDjoZgRXTTYdy830QtO0oIJjW7sFAc1Mh5D2y8:U9OQj85c91wZgjbaJa7d2y8

    Score
    10/10
    • Detect Rokrat payload

    • Rokrat

      Rokrat is a remote access trojan written in c++.

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks