New JavaScript malware RATDispenser used to distribute RAT

Security experts at HP 發現 a new JavaScript malware called RATDispenser. The malware is used as a dropper: to infect systems and then deploy Remote Access Trojans (鼠).

According to experts, RATDispenser has been spreading for more than three months through spam emails with malicious attachments.

With an 11% detection rate, RATDispenser appears to be effective at evading security controls and delivering malware. In total, we identified eight malware families distributed using this malware during 2021. All the payloads were RATs, designed to steal information and give attackers control over victim devices.Hewlett Packard experts write.

These files use the classic double-extension trick (filename.txt.js): they pretend to be text files, but when opened, they run JavaScript code.

JavaScript

If the user launches such a file, the RATDispenser malware decodes itself and launches a stand-alone VBScript, which then installs a remote access Trojan on the infected device. Over the past three months, malware has been used to spread at least eight different RATs, including STTRAT, WSHRAT, AdWind, Formbook, Remcos, Panda Stealer, GuLoaderRatty.

RATDispensers

The most interesting among them is Panda Stealer. This new family of malware, first seen in April 2021, targets cryptocurrency wallets. All of the Panda Stealer samples analyzed by the Hewlett Packard researchers were fileless variants that download additional payload from the paste.ee text storage site.

The variety of malware families, many of which can be purchased or downloaded for free from underground marketplaces, and the fact that malware operators usually prefer to distribute their own payloads, suggest that the authors of RATDispenser operate in a malware-as-a-service manner. We are particularly concerned that only 11% of anti-virus products detect RATDispenser, and as a result, this malware, in most cases, is successfully deployed to victim machines.the researchers write.
In total, HP found about 155 new malware samples belonging to three different versions, suggesting that the malware is still in development.

Let me remind you that we also talked about the fact that 新增功能 BotenaGo Botnet Uses 33 Exploits against IoT Devices.

黑尔加·史密斯

我一直對電腦科學感興趣, 尤其是數據安全和主題, 而家被稱為 "數據科學", 由我十幾歲開始. 在進入病毒清除團隊擔任主編之前, 我曾喺多傢公司擔任網絡安全專家, 包括亞馬遜嘅承包商之一. 另一種體驗: 我在雅頓大學同雷丁大學任教.

留言

本網站使用Akismet嚟減垃圾郵件. 瞭解如何處理評論數據.

“返回頂部”按鈕