Severity
High
Analysis Summary
APT37, also known as ScarCruft or Red Eyes, is a North Korean state-sponsored espionage group active since at least 2012. While historically focused on South Korea, the group has expanded its targeting across Asia, the Middle East, and Europe. It has led several notable operations such as Operation Daybreak, Erebus, Golden Time, and Evil New Year, all centered on intelligence collection, disruption, and high-value data theft.
A core tool associated with APT37 is RokRAT, a sophisticated remote-access trojan repeatedly used across its campaigns. By 2025, APT37 continues to evolve its techniques and has shifted to distributing RokRAT through malicious LNK files, moving away from earlier HWP and Word document lures. These LNK files contain PowerShell commands that deploy additional scripts and payloads through temporary directories, enabling a stealthy infection process.
RokRAT’s effectiveness remains rooted in its in-memory execution, encrypted communications, and use of legitimate cloud services such as Dropbox, pCloud, OneDrive, and Yandex Cloud for command-and-control. It also gathers machine-specific information to validate victims and tailor follow-on actions. In 2025, APT37’s continued use and adaptation of RokRAT demonstrates the group’s persistence and growing sophistication, reinforcing its status as a significant cyber threat.
Impact
- Information Theft and Espionage
Indicators of Compromise
Domain Name
- jlrandsons.co.uk
MD5
a6392cfc3a11b972a7060c221d51d1fc
d5fe744b9623a0cc7f0ef6464c5530da
a2ee8d2aa9f79551eb5dd8f9610ad557
ad6273981cb53917cb8bda8e2f2e31a8
SHA-256
0b6df94a47ea02db784376c55f2f099fbe33047436178321070d79f81cd55c35
41d9b6d8cf0fff85bf35327d4b94db629cd9f754c487672911b7f701fe8c5539
e27467f7fdfa721e917384542ce10cc6108dfd78df14e23872cf8df916e0b8c6
4f2617a971b9c78c8b215d6cb65525ff56f0633a3bcd381695a19efe08156a04
SHA1
206f60ff637580b3a06811dc9647df77de60317b
b26a769254487129d64e1043a3eb3a9cbc5ac5fc
c53bdf6c05c13186a622ed9fd67f9edf2662bd47
536d9332e34a2332b1d027fc45b01e0e5419a7cf
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.

