FIN7 APT Hackers Added New Hacking Tools in Their Malware Arsenal to Evade AV Detection

Researchers discovered 2 new hacking tools called BOOSTWRITE and RDFSNIFFER that were added in FIN7 groups malware arsenal with sophisticated capabilities and techniques.

FireEye Mandiant investigators uncovered that these new hacking tools were added for hijacking the DLL load order of the legitimate Aloha utility and load the malware.

The Tool named BOOSTWRITE is a payload dropper that was employed to decrypt the embedder payloads using the specific decryption key from the command & control server and is highly capable of evading Antivirus detection.

Another tool called RDFSNIFFER is a payload of BOOSTWRITE that was developed to perform an unauthorized alteration with Aloha Command Center client, a remote administrator software designed by NCR Corporation and is mainly used in payment cards processing sectors.

BOOSTWRITE using various Tactics, Techniques, and Procedures (TTP’s) such as Code Signing, Execution through Module Load, Deobfuscate,
Data Encrypted, DLL Hijacking and more.

FIN7’s Loader “BOOSTWRITE”

Threat actors abuse the DLL search order that loads the legitimate ‘Dwrite.dll’ that loaded by applications.

During the infection routine, BOOSTWRITE placed on file system alongside the RDFClient binary which helps the loader to force the application to import DWriteCreateFactory instead of legitimate DWrite.dll.

According to FireEye research ” The malware decrypts and loads two payload DLLs. One of the DLLs is an instance of the CARBANAK backdoor; the other DLL is a tool tracked by FireEye as RDFSNIFFER which allows an attacker to hijack instances of the NCR Aloha Command Center Client application and interact with victim systems via existing legitimate 2FA sessions. “

RDFSNIFFER With RAT Feature

RDFSNIFFER dropped by BOOSTWRITE which allows an attacker to tamper the legitimate connections via RDFClient, and alter the DLL to hijack elements of its user-interface.

“This module also contains a backdoor component that enables it to inject commands into an active RDFClient session. This backdoor allows an attacker to upload, download, execute and/or delete arbitrary files”

Evade the Detection

 Mandiant investigation identified that the BOOSTWRITE was signed using a code signing certificate issued by MANGO ENTERPRISE LIMITED and it was uploaded to VirusTotal on October 3.

“It is not a completely new technique for FIN7 as the group has used digital certificates in the past to sign their phishing documents, backdoors, and later stage tools,” FireEye said.

Researchers believe that the actors behind these tools are actively altering this malware to avoid traditional detection mechanisms.

FIN7 increases their chances of bypassing various security controls and successfully compromising victims by exploiting the trust, inherently provided by code certificates.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…

28 minutes ago

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…

31 minutes ago

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial…

41 minutes ago

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection…

47 minutes ago

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails

A financial management app named Finance Simplified has been revealed as a malicious tool for…

59 minutes ago

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan,…

1 hour ago