BitRAT Disguised as Windows 10 License Verification Tool to Compromise PC

BitRAT is one of the best Remote Access Trojan (RAT) available for sale in a hacking forum since 2020. Attackers rely on this RAT mostly because of its salient features like running process tasks, file tasks, and remote commands along with info-stealing features, HVNC.

Remote Desktop, coin mining, and proxies. It is natively coded in C and is very much compatible with affecting Windows.

Researchers at ASEC recently found BitRAT distributed via Webhard. Webhard is a file-sharing platform that largely contains illegal items. It is a very simple technology than peer-to-peer or other sharing protocols like BitTorrent. It is mostly used by Korean threat actors.

Ever since the usage of Windows, illegal activation of windows without proper license files has been done through various methods. One of the methods was using an activator file that converts a trial version of windows into a licensed one through various methods.

The recently found BitRAT was disguised as an activator file for windows. It is typically a Windows 10 License Verification File with the name “W10DigitalActivation.exe”.

This is delivered by a compressed file named “Program.zip”. Threat actors post on public websites which tell the user to click on a link for “Windows License Verification Tool” which is the “Program.zip” file. This zip archive contains the “W10DigitalActivation.exe” file along with a few other files.

The “Program.zip” file is locked with a password “1234”.

The “W10DigitalActivation.exe” file consists of two .msi files “W10DigitalActivation.msi” and “W10DigitalActivation_Temp.msi”. When the user double clicks on the activation file, One of them does the actual verification (W10DigitalActivation.msi) while the other downloads malware into the system.

Once the malware downloader runs, it connects with its C&C servers which provide the download URL for the additional payload.

The “W10DigitalActivation_Temp.msi” installs the malware in the Windows Startup Program Folder and deletes itself. The second downloader installs BitRAT in the %TEMP% folder as “Software_Reporter_Tool.exe”.

Another feature of this malware is that it excluded the “Software_Reporter_Tool.exe” file from Windows Defender with Powershell Command.
ASEC has published a complete report on this malware and its analysis.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…

1 hour ago

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…

1 hour ago

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…

3 hours ago

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000 malicious…

4 hours ago

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in Taiwan…

5 hours ago

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language…

5 hours ago