Thursday, April 3, 2025
Homecyber securityHackers Using ScrubCrypt 'AV Evasion Tool' To Exploit Oracle WebLogic Servers

Hackers Using ScrubCrypt ‘AV Evasion Tool’ To Exploit Oracle WebLogic Servers

Published on

SIEM as a Service

Follow Us on Google News

Hackers exploit Oracle WebLogic Servers, knowing that they are extensively used in enterprises.

Threat actors can use security vulnerabilities present in the WebLogic servers to gain unauthorized access to sensitive data and install backdoors that open avenues for further exploitation.

FortiGuard Labs recently uncovered the 8220 Gang using ScrubCrypt, an antivirus evasion tool, to launch attacks on exploitable Oracle WebLogic servers last year. 

Recently, a threat actor distributed a phishing email with malicious SVG files, downloading an obfuscated Batch file containing BatCloak, which uses ScrubCrypt to load VenomRAT payload. 

It maintains a C2 connection to install plugins like VenomRAT v6, Remcos, XWorm, NanoCore, and crypto wallet stealer on victims’ systems, bypassing antivirus detection.

ScrubCrypt ‘AV Evasion Tool’

The attacker begins with a phishing email claiming package delivery, attaching an SVG file titled “INV0ICE_#TBSBVS0Y3BDSMMX.svg” containing base64-encoded data.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

When opened, the ECMAScript converts it to a ZIP file named “INV0ICE_#TBSBVS0Y3BDSMMX.zip,” containing an obfuscated batch file. 

Presumed to be from the BatCloak tool, it copies a PowerShell file to “C:\Users\Public\xkn.exe” and hides its activities with parameters. 

Decoding the data, it saves as “pointer.png,” then as “pointer.cmd” in a hidden directory. Upon executing “pointer.cmd,” all files are deleted using “cmd /c del.

The “pointer.cmd” file is a ScrubCrypt batch file that deliberately fills it with jumbled-up strings so that it is difficult to read.

It consists of two payloads, which are Base64 encoded, decrypted using AES-CBC, and compressed using GZIP. 

It uses PowerShell to load an assembly from a byte array and execute its code.

The initial payload establishes persistence and loads malware, which checks for administrator privileges and the presence of a debugger.

In addition, if the user has special rights, then the script copies itself over to “strt.cmd” and schedules a task.

Otherwise, it copies itself into the “StartUp” folder. Next, it loads an assembly called “P” to initiate VenomRAT, Fortinet said.

The second payload evades AMSI and ETW to enable remote access.

Spam emails propagating unauthorized system access, like a modified Quasar RAT called VenomRAT, distribute this malware.

Attack chain (Source – Fortinet)

It sends victim details back to its command and control (C2) server. Debugging shows keep-alive sessions and mechanisms for acquiring plugins.

After receiving orders, it unzips and stores plugins using filename-based PowerShell commands.

Here below, we have mentioned all the plugins that are used:-

The campaign involves various levels of obscurity and uses phishing emails and malicious software to silently spread VenomRAT through ScrubCrypt as well as other malware plugins that give it persistence, evasion mechanisms, and means for running damaging codes. 

The originality in adapting strategies and utilizing the wide range of functionalities available to infiltrate systems without being detected by security solutions illustrates how complex modern threats are, which demand strong security measures.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...