Resubmissions

29-05-2024 10:21

240529-mdm2rsbc9s 10

08-04-2024 07:38

240408-jge9jsca66 10

General

  • Target

    358122718ba11b3e8bb56340dbe94f51.lnk

  • Size

    56.2MB

  • Sample

    240529-mdm2rsbc9s

  • MD5

    358122718ba11b3e8bb56340dbe94f51

  • SHA1

    0c61effe0c06d57835ead4a574dde992515b9382

  • SHA256

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

  • SHA512

    7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

  • SSDEEP

    98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

Malware Config

Targets

    • Target

      358122718ba11b3e8bb56340dbe94f51.lnk

    • Size

      56.2MB

    • MD5

      358122718ba11b3e8bb56340dbe94f51

    • SHA1

      0c61effe0c06d57835ead4a574dde992515b9382

    • SHA256

      b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

    • SHA512

      7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

    • SSDEEP

      98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

    • Detect Rokrat payload

    • Rokrat

      Rokrat is a remote access trojan written in c++.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks