Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign.
A link that was disguised as a legitimate SharePoint notification was included in the emails that were sent out at the beginning of the attack.
The engine flagged the message as malicious based on several factors: computer vision detected a spoofed Microsoft logo and fake SharePoint template, the LinkAnalysis service traced suspicious redirects and downloaded the linked files for analysis, and the email sender failed SPF authentication.
Free Webinar on Best Practices for API vulnerability & Penetration Testing: Free Registration
After clicking on the link, a series of cumbersome steps were presented to the user, and the file that was downloaded was a ZIP archive that contained an AutoIT script.
The script, when executed, downloaded another archive containing shellcode, which was then injected into a legitimate Windows process (likely via reflective DLL injection) using a technique involving double references to system libraries like ntdll.dll.
The newly injected process likely functioned as the final payload, potentially establishing communication with the attacker’s Command and Control (C2) server for further malicious activity like information theft.
The analysis by Sublime Security highlights the evolving tactics of malware campaigns, employing social engineering with impersonation, multi-stage delivery with obfuscation and scripting, and process injection for payload execution.
An initial AutoIT and shellcode components of this sample exhibit strong indicators of Trickgate activity, which aligns with documented
Trickgate tactics, including Xloader deployment and the use of techniques highly similar to those observed in the AutoIT component.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…
A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…
Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…
The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…
A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…
Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…