RoKRAT Shellcode and Steganographic Threats: Analysis and EDR Response Strategies
A new variant of RoKRAT malware used by APT37 has been identified, employing a two-stage encrypted shellcode injection method and steganography to conceal malicious code in image files. The malware uses shortcut files with embedded commands to execute its attack, distributed via compressed archives. It utilizes a complex decoding process involving XOR operations and injects itself into legitimate Windows processes. The threat actor abuses cloud storage services as command and control channels, using Dropbox access tokens. The malware's stealthy nature, including fileless techniques, makes it difficult to detect with traditional security solutions, highlighting the importance of EDR-based defense strategies for real-time monitoring and analysis of abnormal behaviors.
Pulse ID: 68948bfbbc4dd6eff14c08cb
Pulse Link: https://otx.alienvault.com/pulse/68948bfbbc4dd6eff14c08cb
Pulse Author: AlienVault
Created: 2025-08-07 11:20:27
Be advised, this data is unverified and should be considered preliminary. Always do further verification.