Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

RokRat (DOGCALL) – Malware

July 22, 2024
Reading Time: 16 mins read
in Malware
RokRat (DOGCALL) – Malware

RokRat

Type of Malware

Remote Access Trojan

Addittional names

DOGCALL

Country of Origin

North Korea

Targetes

Government sectors in South Korea as well as journalists, activists, and North Korean defectors

Date of initial activity

2016

Associated Groups

APT37

Motivation

Cyberwarfare, Data theft

Attack Vectors

Phishing campaign mimicking credible senders

Varients

DOGCALL, CloudMensis, RambleOn

Type of information Stolen

Login Credentials
Communication data
Browser Data

Targeted System

Originally supporting only Windows, over the years ROKRAT has adapted to other platforms, with macOS and Android

Overview

ROKRAT is a cloud-based remote access tool (RAT) utilized by APT37 in targeted campaigns primarily focused on South Korean victims. Since 2016, APT37 has employed ROKRAT across multiple operations until 2021. This backdoor is typically disseminated as an encoded binary file, downloaded and decrypted by shellcode after exploiting weaponized documents. ROKRAT, also known as DOGCALL, boasts capabilities such as screenshot capture, keystroke logging, anti-virtual machine evasion techniques, and integration with cloud storage APIs like Cloud, Box, Dropbox, and Yandex. The initial infection vector involves a malicious LNK file, which drops two Windows shortcut files containing obfuscated PowerShell scripts responsible for fetching a second-stage ROKRAT shellcode. Once deployed, ROKRAT enables remote command-and-control (C2) operations, data exfiltration, file manipulation (download/upload), and keylogging. While ROKRAT’s core functionalities have remained stable over time, its distribution tactics have evolved. Recent iterations include archives containing LNK files that initiate complex multi-stage infection chains. Initially exclusive to Windows, ROKRAT has expanded its reach to include macOS and Android platforms. The macOS variant, also identified as CloudMensis, was first documented by ESET in July 2022. Concurrently, Android versions such as RambleOn (Cumulus) have emerged, indicating ROKRAT’s adaptability and persistent threat across diverse operating systems.

Targets

Government sectors in South Korea as well as journalists, activists, and North Korean defectors

How they operate

North Korean threat actors, notably associated with APT37 (Inky Squid, RedEyes, Reaper, ScarCruft), deploy sophisticated malware like ROKRAT (DOGCALL) and others with meticulous operational strategies. These operations typically commence with targeted phishing campaigns designed to entice victims into opening malicious attachments or clicking on compromised links. These phishing emails are meticulously crafted with social engineering techniques to exploit human vulnerabilities and increase the likelihood of successful infection. Upon execution, the malware initiates its malicious activities. Initial payloads, often disguised as innocuous files such as LNK shortcuts or document attachments, facilitate the installation of core malware components. These components exploit vulnerabilities in software or employ social engineering tactics to bypass security measures and gain initial access to the target system. Once established, the malware focuses on achieving persistence. It modifies system settings, creates registry entries, or installs itself in hidden directories to ensure continuous access even after system reboots. This persistence is crucial for maintaining long-term control over the compromised system. Communication with remote command and control (C&C) servers forms a critical aspect of the malware’s operation. Through encrypted channels, the malware connects to C&C servers operated by the threat actors. This connection allows for the remote issuance of commands, updates to malware functionalities, and the exfiltration of sensitive data stolen from the compromised system. Data theft and exfiltration are primary objectives of these operations. The malware is programmed to harvest valuable information, including government documents, intellectual property, personal data, and financial information. Stolen data is encrypted and transmitted back to the C&C servers, where it is stored or further exploited for espionage or financial gain. To evade detection and analysis, the malware employs sophisticated evasion techniques. These may include encryption of communication channels, obfuscation of malicious code to thwart static and dynamic analysis, and the use of steganography to conceal data within seemingly harmless files. These techniques enhance operational security and complicate efforts by cybersecurity professionals to detect and mitigate the malware’s impact. Moreover, the malware may download and execute secondary payloads or tools on compromised systems. These secondary tools expand the malware’s capabilities, allowing for activities such as keylogging, screen capturing, or further network exploitation

MITRE tactics and techniques

Enterprise
  • Application Layer Protocol: Web Protocols (T1071 .001)
  • Application Window Discovery (T1010)
  • Audio Capture (T1123)
  • Clipboard Data (T1115)
  • Command and Scripting Interpreter: Visual Basic (T1059 .005)
  • Credentials from Password Stores: Credentials from Web Browsers (T1555 .003)
  • Credentials from Password Stores: Windows Credential Manager (T1555 .004)
  • Data from Local System (T1005)
  • Debugger Evasion (T1622)
  • Deobfuscate/Decode Files or Information (T1140)
  • Execution Guardrails: Environmental Keying (T1480 .001)
  • Exfiltration Over C2 Channel (T1041)
  • Exfiltration Over Web Service: Exfiltration to Cloud Storage (T1567 .002)
  • File and Directory Discovery (T1083)
  • Indicator Removal: File Deletion (T1070 .004)
  • Ingress Tool Transfer (T1105)
  • Input Capture: Keylogging (T1056 .001)
  • Modify Registry (T1112)
  • Native API (T1106)
  • Obfuscated Files or Information (T1027)
  • Phishing: Spearphishing Attachment (T1566 .001)
  • Process Discovery (T1057)
  • Process Injection (T1055)
  • Query Registry (T1012)
  • Screen Capture (T1113)
  • System Information Discovery (T1082)
  • System Owner/User Discovery (T1033)
  • User Execution: Malicious File (T1204 .002)
  • Virtualization/Sandbox Evasion: System Checks (T1497 .001)
  • Web Service: Bidirectional Communication (T1102 .002)
 

Significant Malware Campaigns

  • The confirmed LNK files contain a command to execute PowerShell via CMD, and their type is similar to the type found in “RokRAT Malware Distributed Through LNK Files (*.lnk): RedEyes (ScarCruft)” posted last year. (May 2024)
References:
  • LNK File Disguised as Certificate Distributing RokRAT Malware
  • CHAIN REACTION: ROKRAT’S MISSING LINK
  • ITG10 likely targeting South Korean entities of interest to the Democratic People’s Republic of Korea (DPRK)
  • ROKRAT
  • RokRAT Malware Distributed Through LNK Files (*.lnk): RedEyes (ScarCruft)
Tags: APIAPT37BoxCloudCloudMensisDOGCALLDropboxGovernmentMalwareNorth KoreaRambleOnRATReaperRedEyesRokRatScarCruftSouth KoreaWindowsYandex
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial