Thursday, January 30, 2025
HomeComputer SecurityHackers Selling HTTP Remote Access Trojan via Weaponized Word Documents in Underground...

Hackers Selling HTTP Remote Access Trojan via Weaponized Word Documents in Underground Market

Published on

SIEM as a Service

Follow Us on Google News

Cyber Criminals selling Parasite HTTP RAT (Remote Access Trojan) on the underground marketplace that distributed via Email to the victims using Weaponized Microsoft office documents.

A dubbed Parasite HTTP  is a professionally coded modular remote administration tool for windows Which is written by malware authors using “C” programming language.

It uses a technique called an extensive array for sandbox detection, anti-debugging, anti-emulation, and other protections.

So Parasite HTTP provides numerous examples of state-of-the-art techniques used to avoid detection in sandboxes and via automated anti-malware systems.

This Remote access Trojan module capable of adding new add-ons which is available on the C&C server that can be downloaded at any time for post infection process.

The researcher believes that Parasite HTTP continues to propagate across other malware variants.

RAT Propagation using Parasite HTTP RAT

An initial stage of this RAT champaign observed from the Underground forum and it propagates using Email messages that posed to be resumes or CV submissions and it uses subjects that mimic advertised position and other related contents.

Email ID domain contains some individual recipients at a range of organizations that make to believe that, it comes from a particular organization.

Also distributed Emails with contained Microsoft Word attachments with names such as  my_cv.doc, resume_.doc, cvnew.doc.

Also, the document contains macro and it force to enable it by users, once it enabled then it download Parasite HTTP from a remote site.

Attackers using this Parasite HTTP ad for evading detection and analysis that contains lots of following sophisticated futures.

  • No dependencies (Coded in C)
  • Small stub size (~49kb uncompressed, ~23kb compressed)
  • Dynamic API calls (No IAT)
  • Encrypted strings
  • Bypass Ring3 hooks
  • Secure C&C panel written in PHP
  • Firewall bypass
  • Supports both x86 and x64 Windows OS (from XP to 10)
  • Full unicode support
  • Online builder tied to your domain/s (Build bot bin anytime with any settings you wish)
  • Encrypted communication with C&C panel (Optional – SSL using self signed certificate)
  • Plugin system
  • Multiple backup domains
  • System wide persistence (x86 processes only) (Optional)
  • Injection to whitelisted system process (Optional)
  • Install & Melt (Optional)
  • Hidden startup (Optional)
  • Anti-Emulation (Optional)
  • Anti-Debug
  • Extended statistics and informations in the panel
  • Advanced task management system
  • On Connect task (New clients will execute task/s)
  • Low resource usage
  • Special login page security code
  • Captcha on login page to prevent brute force attacks
  • Download & Execute (Supports both HTTP and HTTPS links)
  • Update
  • Uninstall

Also, Parasite HTTP contain well framed obfusticated futures such as string obfuscation and evasion & anti-sandbox techniques.

According to Proofpoint, Parasite HTTP uses a sleep routine to delay execution and check for sandboxes or emulation.

Also, there are some important Plugins that Supported by Parasite HTTP RAT.

  • User management
  • Browser password recovery
  • FTP password recovery
  • IM password recovery
  • Email password recovery
  • Windows license keys recovery
  • Hidden VNC
  • Reverse Socks5 proxy

When Parasite HTTP actually does detect a sandbox, it attempts to hide this fact from any observers. It does not simply exit or throw an error, instead of making it difficult for researchers to determine why the malware did not run properly and crashed.

Cybercriminals and malware authors continuously innovate in their efforts to evade defenses and improve infection rates.

Also Read

Beware !! Hackers Deliver FlawedAmmyy RAT via Weaponized Microsoft Word and PDF Documents
US-CERT Alerts Powerful Emotet Banking Malware Attack on Government, Private and Public Sectors
Dangerous macOS Backdoor That Steals User Login Credentials Remained Undetected for Years
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has...