Skip to content

ROKRAT Loader Malware Hash- Detect

ID: rokrat-malware-hash

Severity: info

Author: pussycat0x

Tags: malware,taudprkapt

Designed to catch loader observed used with ROKRAT malware

id: rokrat-malware-hash
info:
name: ROKRAT Loader Malware Hash- Detect
author: pussycat0x
severity: info
description: |
Designed to catch loader observed used with ROKRAT malware
reference:
- https://www.carbonblack.com/2018/02/27/threat-analysis-rokrat-malware/
- https://github.com/Yara-Rules/rules/blob/master/malware/APT_DPRK_ROKRAT.yar
tags: malware,taudprkapt
file:
- extensions:
- all
matchers:
- type: dsl
dsl:
- "sha256(raw) == 'e1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd'"
# digest: 4b0a00483046022100ada9ced2dcd53e3a02f97b0edfbf8a37251c835f792b65df53d65eb2e6561f1102210088142fd7a1a621177759a9abbe268fc9d5b9983a42e53c76cd74e2570ce7c352:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/hash/rokrat-malware-hash.yaml"

View on Github