Friday, April 11, 2025
HomeCyber Security NewsHackers Weaponizing PDF files To Deliver New SnipBot Malware

Hackers Weaponizing PDF files To Deliver New SnipBot Malware

Published on

SIEM as a Service

Follow Us on Google News

The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted credential gathering.

It employs various attack methods, including PDF-based downloaders and executable payloads, to compromise victim systems. 

The threat actors behind RomCom have been active since at least 2022 and utilize stolen or fraudulently obtained code-signing certificates to enhance their malware’s legitimacy.

- Advertisement - Google News

They employed a multi-stage email phishing campaign to deliver SnipBot malware by luring victims with malicious emails containing links that redirected to attacker-controlled domains, such as fastshare[.]click and docstorage[.]link, and then redirected to legitimate file-sharing services, like temp[.]sh, where the SnipBot downloader was hosted. 

Different URL chains from the email to the downloader 
Different URL chains from the email to the downloader 

Attackers used similar tactics in subsequent campaigns, creating new domains like publicshare[.]link to distribute different malware variants, demonstrating the attackers’ persistence and adaptability in targeting multiple victims.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

SnipBot is a new variant of the RomCom malware family that infects systems through a disguised executable file, using anti-sandbox tricks to avoid detection. It injects malicious code into legitimate processes. 

The malware communicates with its command and control server to receive commands and download additional payloads. These payloads can steal files, capture screenshots, establish network tunnels, and potentially perform other malicious activities. 

 SnipBot execution flows from the initial EXE downloader to the main bot file single.dll.
 SnipBot execution flows from the initial EXE downloader to the main bot file single.dll.

The researchers at Palo Alto Networks analyzed several newer versions of a downloader, finding that they were similar in function but differed in implementation.

All samples were hosted on temp[.]sh and connected to various C2 domains to download payloads. 

The newest version used dynamic API resolution and removed window message-based obfuscation, while older versions employed window-related API functions and registry-based anti-sandbox techniques, and the earliest version, submitted in December 2023, used a PDF lure to trick victims into downloading the downloader.

Fake Adobe website leading to the SnipBot downloader.
Fake Adobe website leading to the SnipBot downloader.

Attackers initially conducted reconnaissance on the victim’s network using command-line tools and then exfiltrated sensitive files, including personal health data, using WinRAR and PuTTY. 

They encountered challenges during the exfiltration process and attempted to resolve them by downloading additional payloads. They also created a snapshot of the local AD database, though it’s unclear whether this succeeded.

Ultimately, the attackers abandoned the victim’s system, likely due to limited access to company resources.

Code flaw by using the API function CreateDirectoryA() twice.
Code flaw by using the API function CreateDirectoryA() twice.

The malware analysis reveals a poorly coded C++ application that utilizes multiple long functions to implement its functionalities.

The code exhibits minor errors, suggesting the attacker’s familiarity with Windows development but lack professional expertise. 

For instance, the redundant use of the CreateDirectoryA API function indicates a likely copy-paste mistake.

It provides the C2 and staging domain information, including their last active IP addresses, which are crucial for identifying and disrupting the malware’s communication channels.

Analyse AnySuspicious Links Using ANY.RUN's New Safe Browsing Tool: Try It for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...