SYMBOLCOMMON_NAMEaka. SYNONYMS
win.roningloader (Back to overview)

RONINGLOADER


There is no description at this point.

References
2025-11-15ElasticJia Yu Chan, Salim Bitam
RONINGLOADER: DragonBreath’s New Path to PPL Abuse
DragonBreath RONINGLOADER
Yara Rules
[TLP:WHITE] win_roningloader_w0 (20251118 | No description)
rule win_roningloader_w0 {
    meta:
        author = "Elastic Security"
        id = "a4e851ac-7787-4f75-9aab-32c17c253c7a"
        fingerprint = "42d19ba97783f3807c096c1d1d5d17052530cc734d680c5baa8fc3c50cc10eee"
        creation_date = "2025-10-20"
        last_modified = "2025-11-03"
        threat_name = "Windows.Trojan.RoningLoader"
        reference_sample = "c84764a19543e9bdfe06263d3dd68bbf9df381bbe4d0c0da480bc4eddea293b6"
        severity = 100
        arch_context = "x86"
        scan_context = "file, memory"
        license = "Elastic License v2"
        os = "windows"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.roningloader"
        malpedia_version = "20251118"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:CLEAR"
    strings:
        $binary0 = { 48 89 45 80 8B 05 C5 E8 0C 00 48 0F 47 4C 24 70 66 89 04 51 48 8D 44 24 70 66 44 89 6C 51 02 }
        $str0 = "Successfully created PPL process with PID: " wide fullword
        $str1 = "C:\\Windows\\System32\\ClipUp.exe" wide fullword
        $str2 = "regsvr32.exe /S"
    condition:
        $binary0 or all of ($str*)
}
Download all Yara Rules