Happy Tuesday everyone! #APT37 is the topic of today's #readoftheday, specifically ThreatMon takes a deep-dive into the #RokRat malware, which is a remote access trojan (RAT). Enjoy and Happy Hunting!
Link to article in the comments!
***AS usual I am going to leave one of the MITRE ATT&CK blank. I would like to see if any of you that see this can help FILL in that blank! If so, leave your thoughts in the comments OR send me a DM!***
Notable MITRE ATT&CK TTPs:
TA0007 - Discovery
T1087 - Account Discovery
T1083 - File and Directory Discovery
T1018 - Remote System Discovery
T1082 - System Information Discovery
TA0009 - Collection
T[What technique covers the threat actor capturing information under the TEMP folder?] - Good luck!
TA0011 - Command And Control
T1071.001 - Application Layer Protocol: Web Protocols
TA0002 - Execution
T1059.003 - Command and Scripting Interpreter: Windows Command Shell