Tuesday, April 1, 2025
HomeCyber Security NewsA New Remote Access Trojan Dubbed Woody Rat Delivered as Office Documents

A New Remote Access Trojan Dubbed Woody Rat Delivered as Office Documents

Published on

SIEM as a Service

Follow Us on Google News

The Threat Intelligence team of Malwarebytes discovered a new Remote Access Trojan called ‘Woody Rat’ that targets Russian entities by using lures in archive file format and Office documents leveraging the Follina vulnerability.

Malwarbytes researchers stated that the threat actors aim to target a Russian aerospace and defense entity called ‘OAK’.

Remote Access Trojan – Woody Rat

According to the researchers, Woody Rat has been distributed using two different formats namely, archive files and Office documents using the Follina vulnerability.

The Follina vulnerability allows an attacker to execute arbitrary code using a malicious Word document. This vulnerability leverages the built-in MS URL handlers to trigger msdt.exe, this process can then be used to execute PowerShell commands.

In this case, the threat actor is using a Microsoft Office document that has weaponized with the Follina (CVE-2022-30190) vulnerability to drop Woody Rat.

https://blog.malwarebytes.com/wp-content/uploads/2022/08/figure1.png
Woody Rat distribution methods

The initial versions of this Rat were archived into a zip file pretending to be a document specific to a Russian group. But after the arrival of Follina vulnerability, threat actors switched to it to distribute the payload.

In the Archive files method, Woody Rat is packaged into an archive file and sent to victims. It is believed that these archive files have been distributed using spear phishing emails. For instance: anketa_brozhik.doc.zip: Contains Woody Rat with the same name: Anketa_Brozhik.doc.exe.

Therefore the distribution methods gather system information, list folders and running processes, execute the commands and files received from the command-and-control (C2) server, downloading, upload, and delete files on infected machines, and take screenshots.

Experts say this Rat can execute .NET code and PowerShell commands and scripts received from its C2 server using two DLLs named WoodySharpExecutor and WoodyPowerSession.

“Historically, Chinese APTs such as Tonto team as well as North Korea with Konni have targeted Russia. However, based on what we were able to collect, there weren’t any solid indicators to attribute this campaign to a specific threat actor”, say the researchers.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...

Kentico Xperience CMS XSS Vulnerability Allows Remote Code Execution

Kentico Xperience CMS, a widely used platform designed for enterprises and organizations, is under...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...