Friday, June 14, 2024

Astaroth Trojan Disguises as JPEG, GIF File Abuses OS and Antivirus Process to Steal Data

A new unique campaign abuses system native OS process and security software to steal passwords and personal information. Threat actors disguise the Astaroth Trojan payload as JPEG, GIF, and extensionless to avoid file detections.

The campaign especially targets the users in Brazil and the initial infection starts with a phishing-based campaign.

Researchers form cybereason observed a major difference between the new and the old campaign and the attack has improved significantly when compared to the previous campaign. With this new campaign, attackers use the BITSAdmin tool to download the final payload.

The campaign begins with the phishing email with a .7zip attachment contains a .lnk file that initiates the malware process, then it uses legitimate windows tool wmic.exe to initiate an XSL Script Processing attack.

According to researchers, the XSL Script is highly obfuscated to hide its activities from Antivirus and to evade analysis. Then the XSL Script abuses the BITSAdmin admin tool to download the malicious payload.

Astaroth Trojan Campaign

Once the malicious payload executed in the machine it looks for avast installation and injects a malicious mode into the avast process for loading other modules and gathering information about the machine. The Second module looks to exfiltrate the password and other information.

If the trojan executed successfully it exfiltrates the following information

  • users keystrokes
  • Intercept OS calls
  • ail account passwords
  • Messenger accounts
  • Internet Explorer passwords
  • Infiltrates clipboad information

The malicious process infects for a certain time through target process it deletes itself and then continue the process periodically. Once the system infected with the malware it continues exfiltrating information and sends to C2 server.

Related Read

Hackers Launching Trickbot Malware That Steals VNC, PuTTY and RDP Credentials

New Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles