Press ESC to close

Threat actor abuses Gophish to deliver new PowerRAT and DCRAT

Category Details
Threat Actors Unknown threat actor
Campaign Overview Phishing campaign using Gophish toolkit; delivers PowerRAT and DCRAT; involves modular infection chains requiring user intervention.
Target Regions Russian-speaking users in Russia, Ukraine, Belarus, Kazakhstan, Uzbekistan, and Azerbaijan; phishing emails masquerade as VK social media content.
Methodology Phishing emails with malicious Word documents and HTML files containing JavaScript.
Product Targeted VK (Vkontakte) social media application.
Malware Reference PowerRAT, DCRAT, GOLoader, SFXRAR executables.
Tools Used Gophish phishing toolkit, PowerShell, JavaScript, SFXRAR, GOLoader.
Vulnerabilities Exploited Abuse of Windows NT autorun registry key (HKEY_CURRENT_USER…\LOAD); modification of Microsoft Defender Antivirus settings.
TTPs Phishing, modular payload delivery, PowerShell execution, registry abuse, base64 encoding, reconnaissance, C2 communication, information stealing, DLL injection, keystroke logging, and persistence through file disguise.
Attribution Overlaps with techniques from earlier SparkRAT attacks (April 2024).
Recommendations – Avoid enabling macros in documents from unknown sources.
– Regularly monitor and secure autorun registry keys.
– Strengthen email filtering to detect phishing.
– Update antivirus signatures and block C2 domains.
Source Cisco Talos Blog

Read full article: https://blog.talosintelligence.com/gophish-powerrat-dcrat/

Disclaimer: The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *