Rozena belongs to a growing family of file less malware. Its executable is disguised with Microsoft Office Word Document's icon that lure its victim to open it.
Upon execution, it creates a file in Windows Temporary folder with a filename Hi6kI7hcxZwUI. From where it will spawn a PowerShell script via command line. Then it contact its command and control server's IP, 18.231.121.185:443, in Brazil, which is hard coded in the PowerShell script. Rozena Signatures are as follows.
MD5: ee190bb454105ad2b21c037166739be1
SHA1: 3d53530069318eda41be9f76881dbdfb4b22b8e3
SHA256: c23d6700e93903d05079ca1ea4c1e36151cdba4c5518750dc604829c0d7b80a7
SSDEEP: 6144:4+f/R+tx4U9F1EWONas5t38dX6p4098E43U7kpjPcnFOHuln+Otc+EkzI8jSejCd:QKmFWR5nlvFzuExQdbs/5OuOO1RU
Rozena Sample Download