Tuesday, April 1, 2025
HomeBackdoorTA505 APT Hackers Launching ServHelper Backdoor Malware via Weaponized Excel Documents

TA505 APT Hackers Launching ServHelper Backdoor Malware via Weaponized Excel Documents

Published on

SIEM as a Service

Follow Us on Google News

Well-Known and advanced threat actors groups TA505 APT distributing a new variant of ServHelper malware that distributed via weaponized Excel 4.0 macro to open a backdoor & steal sensitive information from infection system.

TA505 threat actors associated with various high profile cyber attackers including infamous Dridex banking trojan and Locky ransomware, delivered through malicious email campaigns.

TA505 group mainly targeting various institutions and organizations including banks, retail businesses, and restaurants.

In this case, Excel 4.0 macro Dropper employed by an attacker to deliver the ServHelper Backdoor and the payload legitimately singed with a valid digital signature to evade the detection.

ServHelper Malware Infection Process

Initially malicious Excel sheet being delivered via malspam emails, once the victims open the document, Excel 4.0 macro is executed and its calls the msiexec.exe in order to download and execute the ServHelper payload.

ServHelper installer singed with a valid digital signature and the The certificate used to sign the malware was issued to “MASLAK LTD” of Uxbridge.

According to the Deep Instinct research, “Once the dropped payload is executed, it will drop a DLL file contained in the installer to \%TEMP%\xmlparse.dll, and use rundll32.exe to call the DLL’s exported function “sega”.

The malware will then write a base64 encoded PowerShell script (which is contained in xmlparse.dll as a resource) to \%TEMP%\enu1.ps1 and execute it.”

Later the malware write the base64 encoded PowerShell script for
reconnaissance purposes, as well as it checks if a machine is part of a domain and if the user has Admin privileges or is part of the Admin Group.


ServHelper attack flow

Finally, ServHelper communicates with its C2 to receive the following command from the attacker,

  • shell – execute a shell (cmd.exe)command and return its output
  • loaddll –download a DLL file and load it using rundll32.exe
  • persist – write an auto-run registry entry at HK_CU\Software\Microsoft\Windows\CurrentVersion\Run\ as “Intel Protect”, returns “persistence established” if successful.
  • slp – enter sleep mode
  • selfkill – remove the malware from the infected machine

“TA505 is a highly advanced global threat actor. It employs a vast array of sophisticated, constantly developed malware for different purposes, for which it exploits the most recently discovered and publicized weak points.” Deep instinct said.

Indicator of Compromise

Excel 4.0 macro Dropper

63522e00181e6b8d9ae8bfd51f7df8f8ebd0f42323e22047269df9c7a71c9b6d

NSIS Payloads

e0323064f2561ae02f9efae418aeaf433b3fe0e6e3a640a9c46ec404d4563de1 302aa690ae61d36769ecdaa3d23ac8fb167e80aed2fe5dbc8938f7b75c655a01

ServHelper core DLL

bee3b2710f7e874ce05e6b8b45cc20e021b9c00ee337238598e71e7315128333 2f827084ecc300aea0c84cba8872c9a34e6afce56eea454d74f4dd3144301a2d

Encoded reconnaissance PowerShell script

da7465f14cd8a934668f59974e8836e02a9b1ff948bfe964040b840ab61697dc da7465f14cd8a934668f59974e8836e02a9b1ff948bfe964040b840ab61697dc

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

New Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card Numbers

New Credential Stealer Malware Campaign Targets Hundreds of Companies Abusing Legitimate Tools

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...

Kentico Xperience CMS XSS Vulnerability Allows Remote Code Execution

Kentico Xperience CMS, a widely used platform designed for enterprises and organizations, is under...

LensDeal Data Breach Exposes 100,000 Customers’ Personal Information

A major data breach involving LensDeal, a Netherlands-based contact lens supplier, has reportedly exposed...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation...

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth...

DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows...