Hackers Using Microsoft Teams to Deliver DarkGate Malware Via HR-themed Messages

Recent reports indicate that threat actors have been using Microsoft Teams to deliver DarkGate Loader malware.

The campaign originated from two compromised external Office 365 accounts identified to be “Akkaravit Tattamanas” (63090101@my.buu.ac.th) and “ABNER DAVID RIVERA ROJAS” (adriverar@unadvirtual.edu.co)

DarkGate loader malware was introduced in 2017 but was only being used by its original developer. However, in June 2023, the malware developer started to advertise it on several cybercrime forums as Malware-as-a-service (MaaS).

It was traditionally spread via email until one of the operators had other ideas and started to use Microsoft Teams to deliver the malware. The message context sent to the victims consisted of an HR-themed social engineering chat message.

Hackers Using Microsoft Teams

Further investigations revealed that the chat messages consisted of an externally hosted Sharepoint link, which contains a ZIP file under the name “Changes to the vacation schedule.zip.”

Phishing message on Microsoft Teams (Source: Truesec)

Once the victims download this ZIP file, it consists of an LNK file (shortcut) disguised as a PDF document and has the name “Changes to the vacation schedule.pdf.lnk”.

LNK file (shortcut) disguised as a PDF file

Further analysis of the LNK file revealed that if opened, the file has several commands for a chain of execution, which will initially create a VBScript file with the name “asrxmp.vbs” in the C:\tpgh\ directory and execute it automatically.

Once the VBScript file gets executed, it downloads the file from the remote server hXXp:// 5[.]188[.]87[.]58:2351/wbzadczl and executes it. This execution leads to the use of the Windows version of cURL (renamed to wbza) for downloading and executing Autoit3.exe and the bundled script eszexz.au3. 

This AutoIT script drops another shellcode file and checks if Sophos is installed before executing it. If not, the AutoIT script deobfuscates its code further and launches the shellcode.

This final shellcode execution creates a file byte to byte to load a new Windows executable identified as the “DarkGate loader” malware.

A complete report has been published by Truesec, which provides detailed information about the deobfuscation, configuration analysis, and other information about this DarkGate loader malware.

“Unfortunately, current Microsoft Teams security features such as Safe Attachments or Safe Links were not able to detect or block this attack.” reads the post by Truesec. This campaign was detected due to the security awareness training of the recipients.

Organizations and IT administrators are recommended to implement some security features, including allowing Microsoft Teams chat requests from specific external domains and creating a whitelist of trusted domains.

It is also recommended that organizations train their employees in cyber security awareness, which can educate all the employees and prevent future attacks.

Indicators of Compromise

FilenameSHA256 Hash
Changes to the vacation schedule.zip0c59f568da43731e3212b6461978e960644be386212cc448a715dbf3f489d758
Changes to the vacation schedule.pdf.lnkbcd449470626f4f34a15be00812f850c5e032723e35776fb4b9be6c7be6c8913
c:\tgph\asrxpm.vbs4c21711de81bb5584d35e744394eed2f36fef0d93474dfc5685665a9e159eef1
c:\wbza\eszexz.au31bcde4d4613f046b63e970aa10ea2662d8aa7d326857128b59cb88484cce9a2d

Command & Control Server

  • hXXp://5[.]188[.]87[.]58:2351

Compromised Email Addresses

  • 63090101@my.buu.ac.th
  • adriverar@unadvirtual.edu.co

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Eswar

Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…

1 day ago

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code execution…

1 day ago

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…

1 day ago

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…

1 day ago

EU Targets Stark Industries in Cyberattack Sanctions Crackdown

The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…

1 day ago

Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats

Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…

1 day ago