New JavaScript malware RATDispenser used to distribute RAT

Security experts at HP have discovered a new JavaScript malware called RATDispenser. The malware is used as a dropper: to infect systems and then deploy Remote Access Trojans (RAT).

According to experts, RATDispenser has been spreading for more than three months through spam emails with malicious attachments.

With an 11% detection rate, RATDispenser appears to be effective at evading security controls and delivering malware. In total, we identified eight malware families distributed using this malware during 2021. All the payloads were RATs, designed to steal information and give attackers control over victim devices.Hewlett Packard experts write.

These files use the classic double-extension trick (filename.txt.js): they pretend to be text files, but when opened, they run JavaScript code.


If the user launches such a file, the RATDispenser malware decodes itself and launches a stand-alone VBScript, which then installs a remote access Trojan on the infected device. Over the past three months, malware has been used to spread at least eight different RATs, including STTRAT, WSHRAT, AdWind, Formbook, Remcos, Panda Stealer, GuLoader and Ratty.


The most interesting among them is Panda Stealer. This new family of malware, first seen in April 2021, targets cryptocurrency wallets. All of the Panda Stealer samples analyzed by the Hewlett Packard researchers were fileless variants that download additional payload from the text storage site.

The variety of malware families, many of which can be purchased or downloaded for free from underground marketplaces, and the fact that malware operators usually prefer to distribute their own payloads, suggest that the authors of RATDispenser operate in a malware-as-a-service manner. We are particularly concerned that only 11% of anti-virus products detect RATDispenser, and as a result, this malware, in most cases, is successfully deployed to victim machines.the researchers write.
In total, HP found about 155 new malware samples belonging to three different versions, suggesting that the malware is still in development.

Let me remind you that we also talked about the fact that New BotenaGo Botnet Uses 33 Exploits against IoT Devices.

Helga Smith

I was always interested in computer sciences, especially data security and the theme, which is called nowadays "data science", since my early teens. Before coming into the Virus Removal team as Editor-in-chief, I worked as a cybersecurity expert in several companies, including one of Amazon's contractors. Another experience: I have got is teaching in Arden and Reading universities.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button