| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
ROKRAT can steal credentials stored in Web browsers by querying the sqlite database.[2] |
| .004 | 从密码存储中获取凭证: Windows Credential Manager |
ROKRAT can steal credentials by leveraging the Windows Vault mechanism.[2] |
||
| Enterprise | T1005 | 从本地系统获取数据 |
ROKRAT can collect host data and specific file types.[4][3][5] |
|
| Enterprise | T1112 | 修改注册表 |
ROKRAT can modify the |
|
| Enterprise | T1115 | 剪贴板数据 |
ROKRAT can extract clipboard data from a compromised host.[3] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
ROKRAT can decrypt strings using the victim's hostname as the key.[3][5] |
|
| Enterprise | T1059 | .005 | 命令与脚本解释器: Visual Basic | |
| Enterprise | T1113 | 屏幕捕获 |
ROKRAT can capture screenshots of the infected system using the |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
ROKRAT can use HTTP and HTTPS for command and control communication.[1][4][5] |
| Enterprise | T1010 | 应用窗口发现 |
ROKRAT can use the |
|
| Enterprise | T1480 | .001 | 执行保护: Environmental Keying |
ROKRAT relies on a specific victim hostname to execute and decrypt important strings.[3] |
| Enterprise | T1083 | 文件和目录发现 |
ROKRAT has the ability to gather a list of files and directories on the infected system.[7][4][3] |
|
| Enterprise | T1106 | 本机API |
ROKRAT can use a variety of API calls to execute shellcode.[5] |
|
| Enterprise | T1012 | 查询注册表 |
ROKRAT can access the |
|
| Enterprise | T1027 | 混淆文件或信息 |
ROKRAT can encrypt data prior to exfiltration by using an RSA public key.[3][5] |
|
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
ROKRAT has relied upon users clicking on a malicious attachment delivered through spearphishing.[5] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| Enterprise | T1082 | 系统信息发现 |
ROKRAT can gather the hostname and the OS version to ensure it doesn’t run on a Windows XP or Windows Server 2003 systems.[1][6][7][4][3][5] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1102 | .002 | 网络服务: Bidirectional Communication |
ROKRAT has used legitimate social networking sites and cloud platforms (including but not limited to Twitter, Yandex, Dropbox, and Mediafire) for C2 communications.[1][7][3] |
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
ROKRAT can check for VMware-related files and DLLs related to sandboxes.[2][4][5] |
| Enterprise | T1622 | 调试器规避 | ||
| Enterprise | T1105 | 输入工具传输 |
ROKRAT can retrieve additional malicious payloads from its C2 server.[1][4][3][5] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
ROKRAT can use |
| Enterprise | T1057 | 进程发现 |
ROKRAT can list the current running processes on the system.[1][4] |
|
| Enterprise | T1055 | 进程注入 |
ROKRAT can use |
|
| Enterprise | T1041 | 通过C2信道渗出 |
ROKRAT can send collected files back over same C2 channel.[1] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
ROKRAT can send collected data to cloud storage services such as PCloud.[5][3] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
ROKRAT has been delivered via spearphishing emails that contain a malicious Hangul Office or Microsoft Word document.[5] |
| Enterprise | T1123 | 音频捕获 | ||