August 10, 2025 at 11:45AM

πŸŽƒHOW APT37 EMPLOYED ROKRAT SHELLCODE AND STEGANOGRAPHIC TECHNIQUE

ℹ️ Researchers have identified a new variant of RoKRAT, the malware associated with North Korea’s APT37 group. This version employs two-stage encrypted shellcode execution and steganography to conceal malicious code inside image files, enabling evasion from traditional detection methods.

πŸ“ INFECTION VECTOR
β–  The intrusion begins with a ZIP archive containing a large .lnk shortcut file, often masquerading as legitimate documents.
β–  Once opened, PowerShell commands embedded within the shortcut unpack multiple hidden components, such as shellcode, batch files, scripts, and decoy documents, and launch the infection chain.

πŸ“TWO-STAGE SHELLCODE DECODING
β–  The initial embedded shellcode is decoded using a single-byte XOR, then injected into a trusted Windows process like mspaint.exe or notepad[.]exe.
β–  A second stage of XOR-based decoding (e.g. key 0xD6) reveals the full RoKRAT payload, which is executed entirely in memory without writing to disk.

πŸ“ STEGANOGRAPHIC PAYLOAD DELIVERY
β–  The standout feature of this variant is the use of steganography: a JPEG image (e.g. “Father.jpg”) is downloaded from cloud services (Dropbox, Yandex, pCloud) and contains encrypted shellcode starting at a non-standard offset.
β–  A dual XOR decoding process transforms this hidden data into an executable loader, which initiates RoKRAT in-memory execution without leaving disk artifacts

πŸ“ C2 COMMUNICATION & TARGETS
β–  RoKRAT communicates with C2 infrastructure via legitimate cloud APIs using expired or stolen tokens tied to Dropbox, pCloud, and Yandex.
β–  The malware collects system info, documents, screenshots, and exfiltrates data in encrypted form, disguised within normal traffic to bypass inspection.

https://www.genians.co.kr/en/blog/threat_intelligence/rokrat_shellcode_steganographic