Wednesday, April 23, 2025
Homecyber securityHackers Exploit Hard Disk Image Files to Deploy VenomRAT

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

Published on

SIEM as a Service

Follow Us on Google News

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware, exploiting a novel technique to bypass security measures.

This campaign begins with a phishing email that uses a purchase order as a lure, enticing users to open an attached archive file.

Upon extraction, the archive reveals a .vhd file, which mounts itself as a hard disk drive when opened.

- Advertisement - Google News

Inside this virtual drive is a batch script that executes malicious activities using PowerShell, ultimately sending sensitive information to command and control (C2) servers.

The VenomRAT Attack Chain

The attack chain involves several stages. Initially, the phishing email tricks users into opening the .vhd file.

VenomRAT
VenomRAT email

Once mounted, the file executes a batch script that is heavily obfuscated with garbage characters, Base64, and AES encryption.

This script spawns a PowerShell process to perform further malicious actions.

It creates a copy of itself in the user’s directory, modifies system registries, and drops a cmd script in the Startup folder to ensure persistence.

The script also connects to Pastebin.com, where C2 information is stored, and drops a file named DataLogs.conf in the AppData/Roaming directory.

This file is used to capture keystrokes and other sensitive data, which are then sent to the C2 servers.

The execution of the batch script involves several key activities.

VenomRAT
Batch file

It creates a .NET compiled executable along with a config file, which acts as a dependency for network connections and performs system checks.

The config file reveals the presence of VenomRAT using HVNC service and specifies an AES key used for decryption.

The malware exploits legitimate services like Pastebin to host its C2 infrastructure, making it challenging to detect.

Protection and Mitigation

To combat this threat, cybersecurity solutions like those offered by Forcepoint can protect against various stages of the attack.

These include identifying and blocking malicious attachments, blocking URLs that download further payloads, adding dropper files to malicious databases, and categorizing C2 servers under security categories to block them.

Users are advised to be cautious with email attachments and to use robust security software to detect and prevent such threats.

As RATs continue to evolve, staying vigilant and employing advanced security measures is crucial to mitigate these sophisticated attacks.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users...

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the "Cookie-Bite Attack," which allows adversaries...

Synology Network File System Vulnerability Allows Unauthorized File Access

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021,...

Super-Smart AI Could Launch Attacks Sooner Than We Think

In a development for cybersecurity, large language models (LLMs) are being weaponized by malicious...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users...

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the "Cookie-Bite Attack," which allows adversaries...

Synology Network File System Vulnerability Allows Unauthorized File Access

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021,...