Technical Analysis & Remediations
MITRE ATT&CK Mapping
T1059.001
(Command and Scripting Interpreter: PowerShell)
T1547.001
(Boot or Logon Autostart Execution: Registry Run Keys)
T1134
(Access Token Manipulation)
T1562.001
(Impair Defenses: Disable or Modify Tools)
T1056.001
(Input Capture: Keylogging)
T1071.001
(Application Layer Protocol: Web Protocols)
CVE Profile
NVD Score: N/A (Custom Malware)
CISA KEV Status: Inactive
Telemetry
Hashes
"7a1d6c969e34ea61b2ea7a714a56d143"
IPs
149.154.166.110
Registry Keys
HKCU\Software\Microsoft\Windows\CurrentVersion\Run (Value: "Resoker"), DisableTaskMgr, ConsentPromptBehaviorAdmin, PromptOnSecureDesktop.
Mutex
"Global\ResokerSystemMutex".
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Authorize immediate threat hunting operations across all Windows endpoints for the identified ResokerRAT telemetry.
DETECT (DE) – Monitoring & Analysis
Command
Implement SIEM alerts for CreateMutexW calls generating the "Global\ResokerSystemMutex" object.
Command
Monitor EDR telemetry for ShellExecuteExA utilizing the "runas" verb on suspicious or unsigned binaries.
Command
Hunt for hidden PowerShell executions (-WindowStyle Hidden) executing System.Windows.Forms and System.Drawing assemblies, which indicates screenshot activity.
RESPOND (RS) – Mitigation & Containment
Command
Isolate endpoints communicating with api.telegram.org over non-standard or unexpected background processes.
Command
Terminate processes holding the identified mutex and remove the "Resoker" value from HKCU\Software\Microsoft\Windows\CurrentVersion\Run.
RECOVER (RC) – Restoration & Trust
Command
Restore registry values DisableTaskMgr (Default: 0), ConsentPromptBehaviorAdmin (Default: 2), and PromptOnSecureDesktop (Default: 1) to their secure baseline states.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Implement AppLocker or Windows Defender Application Control (WDAC) to restrict unauthorized binary execution and PowerShell abuse.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G).
Priority 3: Persistence
Command
Check Scheduled Tasks, Startup Folders, and the Registry (HKCU\Software\Microsoft\Windows\CurrentVersion\Run) for any entry named "Resoker".
Command
If the Task Manager cannot be opened, boot into Safe Mode and run a full system scan with a reputable antivirus solution to automatically repair the modified DisableTaskMgr key.
Hardening & References
Baseline
CIS Benchmarks for Windows 10/11 (Specifically, enforce strict UAC settings and restrict standard user privileges).
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Labs K7
Malware.news
NIST Cybersecurity Framework (CSF) 2.0
NIST Special Publication 800-61 Revision 3
MITRE ATT&CK® Framework (Enterprise)
CISA Known Exploited Vulnerabilities