Saturday, March 8, 2025
HomeCyber Security NewsTA402 Group using Weaponized XLL and RAR Files to Deliver Malware

TA402 Group using Weaponized XLL and RAR Files to Deliver Malware

Published on

SIEM as a Service

Follow Us on Google News

Researchers have discovered a new phishing campaign that targets Middle Eastern and North African Government Entities to deliver a new initial access downloader termed “IronWind.” This downloader is followed by additional payload stages, which downloads a shellcode. 

Most campaigns were using Dropbox links, which then evolved to using XLL and RAR file attachments to evade detection mechanisms. Moreover, this threat actor activity overlaps with Molerats, Gaza Cybergang, Frankenstein, and WIRTE.

Weaponized XLL and RAR Files

The malicious actor employs a hijacked email account belonging to the Ministry of Foreign Affairs to launch phishing attacks against government entities in the Middle East.

The email utilized phishing tactics to deceive its recipients with a message related to economic affairs. The email contained a hyperlink to a Dropbox file, which once clicked, downloaded a harmful Microsoft PowerPoint Add-in (PPAM) file.

Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

This file contains a macro that drops three files such as version.dll (IronWind), timeout.exe, and gatherNetworkInfo.vbs.

The timeout.exe file was used to sideload IronWin, which sends an HTTP GET request to the C2 domain (theconomics[.]net), according to the analysis of August 2023.

Once the C2 receives this request, it responds back with a shellcode, which is the third stage of the infection chain.

Recent Campaign Flow (Source: Proofpoint)
Recent Campaign Flow (Source: Proofpoint)

This shellcode uses .NET loaders to perform WMI queries and also downloads the fourth stage of the malware, which was another .NET executable that uses SharSploit, a .NET post-exploitation library written in C#.

Shifting from PPAM to RAR

The attachments were observed to shift from PPAM to RAR file in October 2023. The RAR file consists of a tabcal.exe file, which sideloads the IronWind and propsys.dll. Other stages of the malware delivery remained the same.

A complete report about this IronWind infection has been published by Proofpoint which provides detailed information about the threat actor, path of compromise, and other vital information.

Indicators of Compromise

SHA256 Value

  • 9b2a16cbe5af12b486d31b68ef397d6bc48b2736e6b388ad8895b588f1831f47
  • 5d773e734290b93649a41ccda63772560b4fa25ba715b17df7b9f18883679160
  • 19f452239dadcd7544f055d26199cb482c1f6ae5486309bde1526174e926146a
  • A4bf96aee6284effb4c4fe0ccfee7b32d497e45408e253fb8e1199454e5c65a3
  • 26cb6055be1ee503f87d040c84c0a7cacb245b4182445e3eee47ed6e073eca47
  • cbb89aac5a2c93a02305846f9353b013e6703813d4b6baff8eb89ee938647af3
  • c98dc0b930ea67992921d9f0848713deaa5bba8b4ba21effd0b00595dd9ed28c
  • ac227dd5c97a36f54e4fa02df4e4c0339b513e4f8049616e2a815a108e34552f
  • 6ab5a0b7080e783bba9b3ec53889e82ca4f2d304e67bd139aa267c22c281a368
  • e2ba2d3d2c1f0b5143d1cd291f6a09abe1c53e570800d8ae43622426c1c4343c
  • d8cde28cf2a5884daddf6e3bc26c80f66bc3737e426b4ba747d49d154999fbc1
  • 81fc4a5b1d22efba961baa695aa53201397505e2a6024743ed58da7bf0b4a97f
  • 3b2a6c7a39f49e790286185f2d078e17844df1349b713f278ecef1defb4d6b04
  • 7bddde9708118f709b063da526640a4132718d3d638505aafce5a20d404b2761
  • 883e035f893483b9921d054b3fa014cef90d90b10dcba7d342def8be2e98ce3c
  • 4b0a48d698240504c4ff6275dc735c8162e57f92224fb1d2d6393890b82a4206
  • 4018b462f2fcf1b0452ecd88ab64ddc5647d1857481f50fa915070f5f1858115
  • 3d80ea70b0c00d12f2ba2c7b1541f7d0f80005a38a173e6962b24f01d4a2a1de

Domains

  • inclusive-economy[.]com 
  • healthcaption[.]com 
  • theconomics[.]net

IP (C2)

  • 191.101.78[.]189

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...