SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using the .NET framework.
This malware is notorious for its advanced obfuscation techniques, making it challenging to analyze and detect.
Recently, cybersecurity researchers uncovered a new campaign where sectopRAT disguises itself as a legitimate Google Chrome extension named “Google Docs,” further amplifying its stealth and data-theft capabilities.
SectopRAT employs the calli obfuscator, a technique that significantly complicates static analysis.
Despite attempts to deobfuscate the code using tools like CalliFixer, the malware’s core functionalities remain concealed.
However, through partial decompilation, researchers identified its extensive capabilities, which include:
sectopRAT’s ability to exfiltrate sensitive information highlights its dual role as both an infostealer and a remote control tool.
According to an analysis, it communicates with its Command and Control (C2) server using encrypted channels, typically over ports 9000 and 15647.
One of the most alarming aspects of this campaign is sectopRAT’s use of a fake Google Chrome extension masquerading as “Google Docs.”
Upon infection, the malware downloads files such as manifest.json
, content.js
, and background.js
from its C2 server.
These files enable the extension to:
The extension operates under the guise of providing offline editing capabilities for Google Docs but instead functions as a sophisticated keylogger and data exfiltration tool.
Key IoCs associated with this campaign include:
http://91.202.233[.]18/wbinjget?q=...
and https://pastebin.com/raw/wikwTRQc
sectopRAT’s ability to mimic legitimate software while evading detection poses a significant threat to individuals and organizations alike.
The malware’s anti-analysis features, such as anti-virtual machine mechanisms and encrypted C2 communication, make it particularly elusive.
To mitigate risks:
%AppData%/Local/llg
.This campaign underscores the evolving tactics of cybercriminals in leveraging trusted platforms like browsers to deploy highly evasive malware.
Enhanced vigilance and proactive security measures are essential to combat such threats effectively.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…
A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…
Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…
The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…
A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…
Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…