Friday, April 18, 2025
HomeTHREATSHackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA...

Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code

Published on

SIEM as a Service

Follow Us on Google News

A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote access Trojan ( RAT ). NetwiredRC and Quasar.

NetWiredRC and  Quasar is a remote access Trojan that used by cyber-criminals to gain complete control of victim’s computer remotely.

Malware authors always finding a unique way to distributing and execute the malware using various social engineering method via malicious documents.

- Advertisement - Google News

Both Remote access Trojan capable of performing various malicious operations such as remote webcam, remote shell and keylogging.

In this scenario, both critical RAT has dropped by macro contain malicious RTF documents with Excel sheets.

Recent days macro enabled malicious documents based malware attacks are widely discovered and getting into large number victims since the Microsoft documents are mainly used platform for the organization as well as individuals for various operations.

Also Read:  Mirai Based Botnet “OMG” Turns IoT Device into a Proxy Server

RAT Infection Flow with VBA Macro Code

Initially, the Malicious  RTF document spreading via social engineering campaign which consists of Macro Excel sheets.

Once a user clicks the  RTF Document, embedded macro repeatedly showing the popup and forcing users to enable the Macros.

In this case, there is no way to stop the popups excepts to click and force stop the whole documents and macro warning popup 1o times because it contains 10 excel documents.

Infection Flow

Malware author used a method called “\objupdate” control in embedded excel sheet that helps to execute the Macro code during the RTF document loaded and this method was abused the CVE-2017-0199, but it is not used in this worst-case scenario.

According to zscaler Reseachers, We observed two variations of the malicious macro in this campaign (see Fig. 5). Although the macro code is identical, it is executing the PowerShell command to download intermediate payloads using Schtasks and cmd.exe.

Later Powershell downloads a malicious VBS Script and executes it the final payload that NetwiredRC and QusarRat.

The malware also permanently enables macros for Word, PowerPoint, and Excel by doing registry modification and disable the protected view settings.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Gamaredon’s PteroLNK VBScript Malware Infrastructure and TTPs Uncovered by Researchers

Researchers have unearthed details of the Pterodo malware family, notably the PteroLNK variant used...

Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools

The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ...