General

  • Target

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

  • Size

    56.2MB

  • Sample

    240403-hk47eaac3z

  • MD5

    358122718ba11b3e8bb56340dbe94f51

  • SHA1

    0c61effe0c06d57835ead4a574dde992515b9382

  • SHA256

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

  • SHA512

    7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

  • SSDEEP

    98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

Score
10/10

Malware Config

Targets

    • Target

      b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

    • Size

      56.2MB

    • MD5

      358122718ba11b3e8bb56340dbe94f51

    • SHA1

      0c61effe0c06d57835ead4a574dde992515b9382

    • SHA256

      b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

    • SHA512

      7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

    • SSDEEP

      98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

    Score
    10/10
    • Detect Rokrat payload

    • Rokrat

      Rokrat is a remote access trojan written in c++.

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks