Home Malware New RAT malware uses sophisticated evasion techniques, leverages COVID-19 messaging

New RAT malware uses sophisticated evasion techniques, leverages COVID-19 messaging

Source Link

Researchers at cybersecurity vendor Proofpoint have analyzed a new remote access Trojan (RAT) malware campaign using sophisticated evasion techniques and leveraging COVID-19 themed messaging to target global organizations. The malware, dubbed “Nerbian RAT” and written in the Go programming language, uses significant anti-analysis and anti-reversing capabilities and open-source Go libraries to conduct malicious activities, the researchers stated.

The campaign was first analyzed by Proofpoint in late April and disproportionately impacts entities in Italy, Spain and the UK. In a statement, Proofpoint Vice President Threat Research and Detection Sherrod DeGrippo said the research demonstrates how malware authors continue to operate at the intersection of open-source capability and criminal opportunity.

Low-volume RAT malware spoofs WHO, leverages COVID-19 pandemic

Starting on April 26, 2022, Proofpoint researchers observed a low-volume malware campaign targeting multiple industries with emails claiming to be representing the World Health Organization (WHO) sharing important information regarding COVID-19. The emails included an attached Word document containing macros that, when opened, revealed information relating to COVID-19 safety, self-isolation, and caring for individuals.

“Interestingly, the lure is similar to themes used in the early days of the pandemic in 2020, specifically spoofing the WHO to distribute information about the virus,” the researchers wrote. The documents also contain logos from the Health Service Executive (HSE), Government of Ireland, and National Council for the Blind of Ireland (NCBI), Proofpoint added.

Nerbian RAT demonstrates macro-enabled attack path, code re-use

When the macros are enabled, the document executes an embedded macro that drops a .bat file which performs a PowerShell invoke web request (IWR) and renames the downloaded file to UpdateUAV.exe before dropping it into a victim’s hard drive, the researchers said. “UpdateUAV.exe is the payload initially downloaded from the malicious Word document. It is a 64-bit executable, written in Golang, 3.5MB in size, and UPX packed,” they wrote. “Likely, this malware is packed with UPX to reduce the overall size of the executable being downloaded. Unpacked, the file is 6.6MB in total.”

Proofpoint named this malware “Nerbian RAT” based on one of the function names in the dropper. Researchers noted that the UpdateUAV executable features significant code re-use, with strings referencing various GitHub projects.

Copyright © 2022 IDG Communications, Inc.

Related Articles

Leave a Comment

techhipbettruvabetnorabahisbahis forumutaraftarium24edueduseduseduedueduedusedueduedus
vulkan vegas
pinco giriş
casibom giriş adresi
plinko
sugar rush 1000
plinko casino
vulkan vegas
sweet bonanza
neyine giriş