Tuesday, November 19, 2024
HomeComputer SecurityBeware !! Orcus RAT Delivered Through Advertisement video Files and Images

Beware !! Orcus RAT Delivered Through Advertisement video Files and Images

Published on

A new highly sophisticated campaign that delivers the Orcus RAT embedded in video files and Images. The campaign mainly focuses on information stealing and .NET evasion.

The Orcus RAT is capable of steal browser cookies and passwords, launch server stress tests (DDoS attacks), disable the webcam activity light, record microphone input, spoof file extensions, log keystrokes and more.

Morphisec labs detected the ongoing campaign, according to their forensic data it appears the samples are widespread and it used by multiple threat actors.

- Advertisement - SIEM as a Service

Orcus RAT Initial Attack

The initial attack starts with an persistent VBscript that executes the powershell script that downloads the obfuscated .NET executable.The .NET script obfuscated and encrypted with ConfuserEx an open source obfuscation framework for .NET applications.

Initial dowbloader has been signed with an invalid Notepad++ certificate and it is encrypted with ConfuserEx and by a custom algorithm and it has ability to download additional modules form paste.ee & bit.ly.

The downloaded executable performs a UAC registry bypass and through windows mscfile registry technique and escalate the process with highest privileges.

The downloader downloads the themed Coca-Cola advertising video that contains an embedded .NET Orcus RAT. The video looks harmless but it contains an .NET executable which represents the Orcus RAT.

Attached Orcus executable is delivered with AES encrypted settings (the SIGNATURE string is the key). By having all the decryption keys and the encrypted setting in hand, we easily extracted the full xml settings for the RAT, reads morphisec report.

The Orcus RAT advertised as a remote administration tool like TeamViewer and other applications, but it is not a clean app, it has the ability to receive cookies form the browser, it has been sold for $70 and it is capable of recovering passwords from famous applications such as Chrome, Firefox and Filezilla.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Phobos Ransomware Admin as Part of International Hacking Operation

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian...

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently...

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow...

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...