HomeCyber BalkansHighly Confusing .NET sectopRAT Imitating Chrome Extension

Highly Confusing .NET sectopRAT Imitating Chrome Extension

Published on

spot_img

Researchers have recently discovered a new campaign involving SectopRAT, also known as Arechclient2, a sophisticated Remote Access Trojan (RAT) developed using the .NET framework. This malware has gained notoriety for its advanced obfuscation techniques, which make it difficult to analyze and detect. The latest development in this cyber threat landscape involves SectopRAT disguising itself as a legitimate Google Chrome extension named “Google Docs,” further enhancing its stealth and data theft capabilities.

SectopRAT utilizes the calli obfuscator technique, which significantly complicates static analysis and hinders efforts to deobfuscate the code using tools like CalliFixer. Despite these challenges, researchers have managed to unveil the malware’s extensive capabilities, which include stealing browser data such as cookies, saved passwords, autofill information, and encrypted keys. Additionally, it can profile victim systems by collecting details about hardware, operating systems, and installed software, target applications like VPNs, game launchers, and communication platforms, and scan for cryptocurrency wallets and FTP credentials.

The dual role of SectopRAT as both an infostealer and a remote control tool is highlighted by its ability to exfiltrate sensitive information. This malicious software communicates with its Command and Control (C2) server using encrypted channels over ports 9000 and 15647, maintaining a sophisticated infrastructure for data theft.

One of the most alarming aspects of the recent campaign involving SectopRAT is its utilization of a fake Google Chrome extension posing as “Google Docs.” Once infected, the malware downloads files from its C2 server, enabling the extension to inject malicious scripts into web pages, capture user inputs like credentials and banking details, and transmit stolen data to the attacker’s C2 server. This deceptive extension operates under the guise of offering offline editing capabilities for Google Docs while functioning as a keylogger and data exfiltration tool.

Key Indicators of Compromise (IoCs) associated with this campaign include specific file hashes, C2 servers, malicious URLs, and mutex names. SectopRAT’s ability to mimic legitimate software presents a significant threat to both individuals and organizations. Its anti-analysis features, such as anti-virtual machine mechanisms and encrypted C2 communication, make it elusive to traditional security measures.

To mitigate the risks posed by SectopRAT and similar threats, security experts recommend actions such as blocking network traffic to identified C2 servers, monitoring for suspicious file activity in specific directories, removing unknown or suspicious Chrome extensions, employing behavioral-based threat detection systems, and restricting the execution of untrusted .NET applications. The evolving tactics of cybercriminals in exploiting trusted platforms like browsers to deploy evasive malware emphasize the need for enhanced vigilance and proactive security measures.

Overall, the emergence of SectopRAT in a new campaign underscores the constant evolution of cyber threats and the importance of staying informed and prepared to defend against sophisticated malware attacks. Organizations and individuals must remain vigilant and take proactive steps to safeguard their data and systems from such nefarious activities.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...