The ModernLoader RAT Trojan Is Used to Infect Systems with Stealers and Cryptominers

According to a new Cisco Talos report, between March and June 2022, there were 3 separate but related campaigns that delivered a variety of malware to compromised systems, including the ModernLoader RAT Trojan, RedLine Stealer, and cryptominers.

Let me remind you that we also wrote that Unusual YTStealer Malware Targets YouTubers, and also that New Windows Trojan steals passwords from Chrome and stores them in MongoDB database.

The hackers used PowerShell, .NET assemblies, and HTA and VBS files to spread across the target network, eventually delivering SystemBCDCRat 木馬, to carry out various steps in their operations.

ModernLoader malware implant in question is designed to remotely control a victim’s computer, which allows an attacker to deploy additional malware, steal confidential information, or even inject the computer into a botnet.

思科塔洛斯 attributed the infection to a previously unregistered Russian-speaking threat actor, citing the use of off-the-shelf tools. Potential targets included users from Bulgaria, Poland, Hungary and Russia.

The chains of infection include attempts to hack vulnerable WordPress and CPanel web applications to distribute malware using files that masquerade as fake Amazon gift cards.

RAT Trojan ModernLoader
ModernLoader infection chain

The first stage payload is an HTA (HTML Application) file that runs a PowerShell script hosted on a command and control (C&C) server to initiate the deployment of intermediate payloads. These payloads then inject malware using process spoofing (Process Hollowing).
The RAT Trojan ModernLoader (also known as Avatar Bot) is equipped with features to:

  1. collection of system information;
  2. execution of arbitrary commands;
  3. downloading and running a file from a C&C server.

These features allow an attacker to modify modules in real time.

The hacker is experimenting with different technologies. The use of off-the-shelf tools shows that the cybercriminal understands all the tactics, techniques, and procedures (TTP) necessary to carry out a malicious campaign, but his technical skills are not sufficiently developed to fully develop his own tools.

關於作者

卡琳娜·威爾遜

隨著超過 10 多年在線和印刷媒體寫作經驗, 我是提供清晰且引人注目的文案的專家.

我曾為一家領先的 SEO 文案機構撰寫文章,也為一些英國最知名的品牌撰寫文章, 雜誌和報紙.

發表評論