The ModernLoader RAT Trojan Is Used to Infect Systems with Stealers and Cryptominers

According to a new Cisco Talos report, between March and June 2022, there were 3 separate but related campaigns that delivered a variety of malware to compromised systems, including the ModernLoader RAT Trojan, RedLine Stealer, and cryptominers.

Ich möchte Sie daran erinnern, dass wir das auch geschrieben haben Ungewöhnlich YTStealer Malware zielt auf YouTuber ab, und auch das New Windows Trojan steals passwords from Chrome and stores them in MongoDB database.

The hackers used PowerShell, .NET assemblies, and HTA and VBS files to spread across the target network, eventually delivering SystemBC Und DCRat Trojaner, to carry out various steps in their operations.

Der ModernLoader malware implant in question is designed to remotely control a victim’s computer, which allows an attacker to deploy additional malware, steal confidential information, or even inject the computer into a botnet.

Cisco Talos attributed the infection to a previously unregistered Russian-speaking threat actor, citing the use of off-the-shelf tools. Potential targets included users from Bulgaria, Poland, Hungary and Russia.

The chains of infection include attempts to hack vulnerable WordPress and CPanel web applications to distribute malware using files that masquerade as fake Amazon gift cards.

RAT Trojan ModernLoader
ModernLoader infection chain

The first stage payload is an HTA (HTML Application) file that runs a PowerShell script hosted on a command and control (C&C) server to initiate the deployment of intermediate payloads. These payloads then inject malware using process spoofing (Process Hollowing).
The RAT Trojan ModernLoader (also known as Avatar Bot) is equipped with features to:

  1. collection of system information;
  2. execution of arbitrary commands;
  3. downloading and running a file from a C&C server.

These features allow an attacker to modify modules in real time.

The hacker is experimenting with different technologies. The use of off-the-shelf tools shows that the cybercriminal understands all the tactics, techniques, and procedures (TTP) necessary to carry out a malicious campaign, but his technical skills are not sufficiently developed to fully develop his own tools.

Über den Autor

Carina Wilson

Mit über 10 Jahrelange Erfahrung als Autorin für Online- und Printmedien, Ich bin ein Experte für die Bereitstellung klarer und überzeugender Texte.

Ich habe für eine führende Agentur für SEO-Texte und für einige der bekanntesten Marken Großbritanniens geschrieben, Zeitschriften und Zeitungen.

Hinterlasse einen Kommentar