Last month @S2W_Official published additional research on #RambleOn, finding other variants of it and highlighting code similarities between a 2017 campaign operated by #APT37 which used a Android variant of #Rokrat Malware
2/6
Note: @S2W_Official Renamed RambleOn malware to Culumus. Reasons for which are unknown.
3/6
After some additional research and historic sample gathering, we have identified a clear and progressive iteration of #ROKRAT Malware evolving into being used as the stage two payload in #RambleOn starting in 2018.
4/6
In addition, we’ve found near exact code correlations between these payloads progressively from 2017 till 2023.
5/6
Next week we will release these findings. We are confident that based on these that RambleOn has been an operation of APT37 and began by evolving ROKRAT in 2018.
6/6
• • •
Missing some Tweet in this thread? You can try to
force a refresh
@hypen1117 Hey Hypen. Thanks kindly for your message. Great to have civil discussion on it! Like I said, I don’t think it really matters. I value your teams research more than this matter, you have done a great thing to society by finding differing versions of RambleOn 1/
@hypen1117 Our analysis was a finding of novel malware that was impacting journalists at that present moment. We found RambleOn then imminently went to work on working with big tech to implement detections and mitigations for it, to better defend society and those at risk 2/
@hypen1117 We didn’t intent to perform a retro hunt at that time, we haven’t the resources for that. So, at that time, we hadn’t had scope of previous versions or correlation with other samples. Your teams research did this, which is amazing and an honorary effort to society 3/