Press ESC to close

LodaRAT: Established Malware, New Victim Patterns

CategoryDetails
Threat ActorsUnknown, potentially a wide range of actors using LodaRAT, as the source code is publicly available and customizable.
Campaign OverviewAn ongoing malware campaign using a new version of LodaRAT, a remote access tool (RAT) that has evolved over 8 years. This new version focuses on stealing cookies and passwords from Microsoft Edge and Brave. The malware is distributed through DonutLoader and CobaltStrike.
Target Regions (Victims)Victims are worldwide, with about 30% of VirusTotal samples originating from the USA.
Methodology– Distributed via trojanized software.
– Uses phishing and known vulnerability exploitation in earlier versions; now uses DonutLoader and CobaltStrike.
– LodaRAT masquerades as legitimate software (Discord, Skype, Windows Update).
Product TargetedMicrosoft Edge, Brave browsers (for cookie and password stealing), and general Windows systems for RAT operations.
Malware ReferenceLodaRAT
Tools Used– DonutLoader, CobaltStrike (for distribution)
– ngrok reverse proxy utility, SMB lateral movement tools (for further infection)
– AutoIt (RAT tool)
Vulnerabilities ExploitedPhishing, known vulnerability exploitation (T1203), masquerading as legitimate software (T1036).
TTPs– Masquerading as legitimate software.
– Establishing persistence via registry modification (T1547.001) or scheduled tasks (T1053).
– Data exfiltration and screen capturing (T1113).
– C2 communication for commands.
AttributionOriginally attributed to Kasablanka APT in 2021, but the 2024 campaign shows a shift in target scope, making attribution unclear.
Recommendations– Use detection tools like Rapid7 InsightIDR for visibility.
– Regularly update systems and security tools.
– Be cautious of phishing attempts and fake software installers.
– Ensure proper firewall configuration.
SourceRapid7

Read full article: https://www.rapid7.com/blog/post/2024/11/12/lodarat-established-malware-new-victim-patterns/

Disclaimer: The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *