Analysis of APT Group's Use of Malicious LNK Files to Deliver RokRat Attack
May 1, 2024, 11:06 p.m.
Description
The report details a recent cyber attack campaign by the APT-C-28 (ScarCruft) group, known for targeting organizations in Korea and Asia. The campaign utilized a malicious LNK file disguised as a document related to a 'North Korean Human Rights Expert Debate' to deliver the RokRat remote access trojan. When executed, the LNK file deployed a series of PowerShell scripts to download and execute the encrypted RokRat payload from a Dropbox link. Detailed analysis of the attack flow and malware components is provided, highlighting the group's persistent use of cloud services and evolving evasion techniques.
External References
Tags
Date
- Created: April 29, 2024, 6:40 p.m.
- Published: April 29, 2024, 6:40 p.m.
- Modified: May 1, 2024, 11:06 p.m.
Indicators
- a9cbb1927b391173265ff7a4fdefed59afeddd5b245a2a58c2637b01f87f6119
- 5237d0498685869d7788406a998e58c829587a1a604106cce7d4042316351e3a
- 3fd02c7057ef1324ad74714a7fc4b00ac338cfb172a788d98e5a781548b8f027
Attack Patterns
- ROKRAT - S0240
- APT-C-28 (ScarCruft)
- T1096
- T1567
- T1012
- T1574
- T1082
- T1105
- T1083
- T1036
- T1204
- T1027
- T1053
- T1112
- T1059