Researchers have recently discovered a new campaign involving SectopRAT, also known as Arechclient2, a sophisticated Remote Access Trojan (RAT) developed using the .NET framework. This malware has gained notoriety for its advanced obfuscation techniques, which make it difficult to analyze and detect. The latest development in this cyber threat landscape involves SectopRAT disguising itself as a legitimate Google Chrome extension named “Google Docs,” further enhancing its stealth and data theft capabilities.
SectopRAT utilizes the calli obfuscator technique, which significantly complicates static analysis and hinders efforts to deobfuscate the code using tools like CalliFixer. Despite these challenges, researchers have managed to unveil the malware’s extensive capabilities, which include stealing browser data such as cookies, saved passwords, autofill information, and encrypted keys. Additionally, it can profile victim systems by collecting details about hardware, operating systems, and installed software, target applications like VPNs, game launchers, and communication platforms, and scan for cryptocurrency wallets and FTP credentials.
The dual role of SectopRAT as both an infostealer and a remote control tool is highlighted by its ability to exfiltrate sensitive information. This malicious software communicates with its Command and Control (C2) server using encrypted channels over ports 9000 and 15647, maintaining a sophisticated infrastructure for data theft.
One of the most alarming aspects of the recent campaign involving SectopRAT is its utilization of a fake Google Chrome extension posing as “Google Docs.” Once infected, the malware downloads files from its C2 server, enabling the extension to inject malicious scripts into web pages, capture user inputs like credentials and banking details, and transmit stolen data to the attacker’s C2 server. This deceptive extension operates under the guise of offering offline editing capabilities for Google Docs while functioning as a keylogger and data exfiltration tool.
Key Indicators of Compromise (IoCs) associated with this campaign include specific file hashes, C2 servers, malicious URLs, and mutex names. SectopRAT’s ability to mimic legitimate software presents a significant threat to both individuals and organizations. Its anti-analysis features, such as anti-virtual machine mechanisms and encrypted C2 communication, make it elusive to traditional security measures.
To mitigate the risks posed by SectopRAT and similar threats, security experts recommend actions such as blocking network traffic to identified C2 servers, monitoring for suspicious file activity in specific directories, removing unknown or suspicious Chrome extensions, employing behavioral-based threat detection systems, and restricting the execution of untrusted .NET applications. The evolving tactics of cybercriminals in exploiting trusted platforms like browsers to deploy evasive malware emphasize the need for enhanced vigilance and proactive security measures.
Overall, the emergence of SectopRAT in a new campaign underscores the constant evolution of cyber threats and the importance of staying informed and prepared to defend against sophisticated malware attacks. Organizations and individuals must remain vigilant and take proactive steps to safeguard their data and systems from such nefarious activities.

