Saturday, June 14, 2025
HomeCyber Security NewsRedCurl APT Deploys Malware via Windows Scheduled Tasks Exploitation

RedCurl APT Deploys Malware via Windows Scheduled Tasks Exploitation

Published on

SIEM as a Service

Follow Us on Google News

Researchers identified RedCurl APT group activity in Canada in late 2024, where the attackers used scheduled tasks to execute pcalua.exe to run malicious binaries and Python scripts, including the RPivot client.py script to connect to a remote server. 

Evidence suggests data exfiltration to cloud storage as this APT group targets various industries and aims for long-term persistence for data collection.

The RedCurl malware leverages PowerShell to download files from a cloud storage location on bora.teracloud[.]jp/dav using HTTP GET requests, which are then unpacked using 7zip with a password stored in the batch file. 

- Advertisement - Google News
Script excerpt 
Script excerpt 

The script then utilizes Python to execute client.py (a RPivot tool from Github) to connect to a predefined IP and port, while the malware harvests system information, including directory listings and running processes, archives and encrypts them with 7zip, and exfiltrates the data back to the C2 server via HTTP PUT requests.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

RedLoader, a backdoor component of the RedCurl malware, utilizes obfuscation techniques to evade detection by decrypting initial DLL names like bcrypt.dll using a rolling XOR routine and dynamically resolves functions within them. 

Cryptographic routine used to decrypt sensitive DLL names
Cryptographic routine used to decrypt sensitive DLL names

Encrypted function names are also decrypted using the same method. Subsequently, resolved functions from bcrypt.dll are employed to generate symmetric keys for further decryption of sensitive DLL names. 

A SHA256 hash of a static key (“PpMYfs0fQp5ERT”) serves as the basis for generating an AES key, adding another layer of encryption that demonstrates the malicious actor’s intent to conceal the malware’s true purpose and hinder analysis.

Adversaries are increasingly using living-off-the-land (LOTL) techniques to carry out attacks that involve using legitimate native Windows binaries and tools to accomplish malicious goals. 

This makes it difficult to distinguish LOTL attacks from normal system administration activity, as in this case, attackers used pcalua.exe in scheduled tasks to execute malicious files and scripts. 

Encrypted strings stored in the .data section
Encrypted strings stored in the .data section

RedCurl uses various techniques to infiltrate the system use legitimate cloud storage for exfiltration and leverage batch files, PowerShell, and Python scripts to execute their attacks. 

According to Huntress, the extraction of files from password-protected archives and archive files for the purpose of data exfiltration is largely accomplished through the use of 7zip.  

Security analysts can hunt for Python scripts that make network connections or identify processes creating network traffic looking for Python executables and can also look for the 7zip process with specific flags used for creating password-protected archive files and deleting the original files.  

Cyberespionage attacks often leverage legitimate software and Living-Off-The-Land (LOTL) techniques to evade detection that necessitating continuous monitoring for anomalous behavior. 

An effective defense requires proactive threat hunting for novel and unusual behaviors across the network, as a multi-layered defense strategy increases the likelihood of identifying suspicious activities and uncovering sophisticated attacks by highly motivated adversaries targeting valuable data.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...