General

  • Target

    1.rar

  • Size

    4.4MB

  • Sample

    240403-qpascsdf7x

  • MD5

    b97fac2bfe6de66b4a615780cb6b1cc2

  • SHA1

    1ccd56e4113b00ea818f47ca90ba16a80f167dba

  • SHA256

    c81d5421b18c59c9d6df2553e5791e2bb37e8b9d34c93004290bae8aa4ed5ec4

  • SHA512

    97e163fc66484c9677802650e7affead5c9f537f746eb0d82b1d196e3e13d9ccea76938211235f68cb562b3fd056526f43ad881f4d244ba7767f9b35e238cc60

  • SSDEEP

    98304:7Hw2wByKZdIAtG/pupt2kv70X+iPLMPGcebMimKHpGu:LPqpagtx7q+iIPczHAu

Score
10/10

Malware Config

Targets

    • Target

      1.rar

    • Size

      4.4MB

    • MD5

      b97fac2bfe6de66b4a615780cb6b1cc2

    • SHA1

      1ccd56e4113b00ea818f47ca90ba16a80f167dba

    • SHA256

      c81d5421b18c59c9d6df2553e5791e2bb37e8b9d34c93004290bae8aa4ed5ec4

    • SHA512

      97e163fc66484c9677802650e7affead5c9f537f746eb0d82b1d196e3e13d9ccea76938211235f68cb562b3fd056526f43ad881f4d244ba7767f9b35e238cc60

    • SSDEEP

      98304:7Hw2wByKZdIAtG/pupt2kv70X+iPLMPGcebMimKHpGu:LPqpagtx7q+iIPczHAu

    Score
    10/10
    • Detect Rokrat payload

    • Rokrat

      Rokrat is a remote access trojan written in c++.

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks