Friday, May 16, 2025
HomeCyber AttackHackers Use Weaponized Lnk File to Deploy AutoIt Malware

Hackers Use Weaponized Lnk File to Deploy AutoIt Malware

Published on

SIEM as a Service

Follow Us on Google News

Hackers have been found utilizing weaponized LNK files to deploy a strain of AutoIt malware, raising alarms across the cybersecurity community.

AutoIt Malware
AutoIt Malware

Unpacking the LNK Malware

The infection chain begins with a seemingly innocuous LNK file, which, upon closer inspection, reveals a malicious command disguised as an image file.

This command is designed to download and execute an HTA file using PowerShell from a remote server.

- Advertisement - Google News

Researchers have taken the initiative to download and scrutinize the contents of this file safely.

Typically, HTA files contain HTML and JavaScript commands. However, this HTA file was packed with binary commands, hinting at an embedded file within.

Upon extraction, an image and an executable file were discovered.

To confirm the legitimacy of the executable, which masqueraded as the official calc.exe, a VirusTotal query was conducted.

Dropped HTA File
Dropped HTA File

Deobfuscating the Malware

To function, the HTA file must contain readable script code. After searching for the term “script,” JavaScript code was found and beautified.

This code contained a string of ASCII characters in decimal format, which appeared to be encoded.

Researchers could automatically deobfuscate the code using the Chrome console, revealing a custom encoding process.

embedded file inside
Embedded file inside

The researchers at Docguard meticulously analyzed the malware, stripping away the layers of obfuscation to understand the full scope of its capabilities.

Decrypting the Layers

The malware’s code was further encrypted with the AES algorithm. Decrypting this layer unveiled Layer 2 PowerShell commands.

To reach the final layer, Layer 3, the encrypted string in the Maf function, considered the main function, had to be decrypted using PowerShell.

without any execute, just execute the decrypt commands
Without any execute, just execute the decrypt commands

The payload, solaris.exe, was downloaded from the remote server and inspected with Detect it Easy, revealing an embedded ZIP file.

After extraction, the first file, named United, contained obfuscated CMD commands.

A custom script was written to parse these commands, making them readable and revealing their functions, which included process checks, file operations, and pinging the local host.

solaris.exe file
solaris.exe file

Cleaning the AutoIt Malware

The AutoIt file contained encoded strings, which were decoded using a function named lambdaok.

After cleaning the file of unused variables and functions, a reverse search was performed to identify and remove unnecessary commands.

The cleaned script revealed critical commands used by the attackers.

clean version
Clean version

The malware exhibited sophisticated sandbox and EDR (Endpoint Detection and Response) evasion techniques.

The final analysis examined the process tree output from Procmon, which provided insights into the malware’s behavior on an infected system.

Process Tree Output
Process Tree Output

IOC

(MD5)848164d084384c49937f99d5b894253e
(MD5)3d89cbe9713713fc038093637a602b29
(MD5)21a3a0d9aaae768fb4104c053db5ba98
(MD5)848164d084384c49937f99d5b894253e
(MD5)80376f01128e490f9d69dc67c724104f
(MD5)5d9e35b2d9e36e9ba926fd73260feabc
(MD5)8ab6a7b4be9af49dc2af1589644d1380
(MD5)8e6f4ac729932bc4ca1528848ac18f1b
(MD5)c05ecddfe47cf14835932fba0cc1d3e1
(MD5)848164d084384c49937f99d5b894253e
(MD5)1a189425d72fd5d2cb9045ffdfcb7c31
(MD5)7e012cfad9fc2540936792e39cfeb683
(MD5)6cef3ef2026901b5a99b1e19e3c01839
(MD5)034a0c0440743b5596be0c6fe4f6c4e5
(URL)mw-solaris[.]com
(IP)91[.92.251].35

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Pwn2Own Day 1 – Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked

Security researchers successfully illustrated significant vulnerabilities across several platforms on the first day of...

SonicWall SMA1000 Vulnerability Allow Attackers to Exploit Encoded URLs To Remotely Gain Internal Systems Access

SonicWall has issued a critical security advisory (SNWLID-2025-0010) for its SMA1000 Appliance Work Place...

Hackers Target Industrial Automation Systems Using Over 11,600 Malware Variants

Hackers are stepping up their attacks on Industrial Control Systems (ICS) in the first...

Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses

Cybersecurity researchers have uncovered a growing trend in which threat actors are exploiting Microsoft...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Pwn2Own Day 1 – Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked

Security researchers successfully illustrated significant vulnerabilities across several platforms on the first day of...

SonicWall SMA1000 Vulnerability Allow Attackers to Exploit Encoded URLs To Remotely Gain Internal Systems Access

SonicWall has issued a critical security advisory (SNWLID-2025-0010) for its SMA1000 Appliance Work Place...

Hackers Target Industrial Automation Systems Using Over 11,600 Malware Variants

Hackers are stepping up their attacks on Industrial Control Systems (ICS) in the first...