cyble.com
Open in
urlscan Pro
2606:4700:20::681a:6b1
Public Scan
Submitted URL: http://cyble.com/blog/lummac-stealer-leveraging-amadey-bot-to-deploy-sectoprat/
Effective URL: https://cyble.com/blog/lummac-stealer-leveraging-amadey-bot-to-deploy-sectoprat/
Submission: On August 15 via api from DE — Scanned from DE
Effective URL: https://cyble.com/blog/lummac-stealer-leveraging-amadey-bot-to-deploy-sectoprat/
Submission: On August 15 via api from DE — Scanned from DE
Form analysis
2 forms found in the DOMGET https://cyble.com/
<form role="search" method="get" class="search-form" action="https://cyble.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s" tabindex="-1">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
<form id="jp-carousel-comment-form">
<label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
<textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
<div id="jp-carousel-comment-form-submit-and-info-wrapper">
<div id="jp-carousel-comment-form-commenting-as">
<fieldset>
<label for="jp-carousel-comment-form-email-field">Email</label>
<input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
</fieldset>
<fieldset>
<label for="jp-carousel-comment-form-author-field">Name</label>
<input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
</fieldset>
<fieldset>
<label for="jp-carousel-comment-form-url-field">Website</label>
<input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
</fieldset>
</div>
<input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
</div>
</form>
Text Content
Skip to content The Q2-2023 Ransomware Report is Now Available. Download Now The Q2-2023 Ransomware Report is Now Available. Download Now Report an Incident | Get Support * Home * ProductsMenu Toggle * Cyble Vision * AmIBreached * Cyble Hawk * Cyble Odin * The Cyber Express * SolutionsMenu Toggle * Function WiseMenu Toggle * Attack Surface Management * Brand Intelligence * Cyber Threat Intelligence * Dark Web & Deep Web * Vulnerability Management * Takedown and Disruption * Industry WiseMenu Toggle * Financial Services * Retail and CPG * Healthcare & Pharmaceuticals * Technology Industry * Educational Platform * Role WiseMenu Toggle * Information Security * Corporate Security * Marketing * ResourcesMenu Toggle * Blog * Case Studies * Research Reports * Whitepapers * SAMA Compliance * Press * Careers * PartnersMenu Toggle * Partner Network * Partner Login * Become a Partner * About Us Talk to Sales Schedule a Demo Schedule a Demo CYBLE IS NOW A SERIES B COMPANY. LEARN MORE Main Menu * Home * ProductsMenu Toggle * Cyble Vision * AmIBreached * Cyble Hawk * Cyble Odin * The Cyber Express * SolutionsMenu Toggle * Function WiseMenu Toggle * Attack Surface Management * Brand Intelligence * Cyber Threat Intelligence * Dark Web & Deep Web * Vulnerability Management * Takedown and Disruption * Industry WiseMenu Toggle * Financial Services * Retail and CPG * Healthcare & Pharmaceuticals * Technology Industry * Educational Platform * Role WiseMenu Toggle * Information Security * Corporate Security * Marketing * ResourcesMenu Toggle * Blog * Case Studies * Research Reports * Whitepapers * SAMA Compliance * Press * Careers * PartnersMenu Toggle * Partner Network * Partner Login * Become a Partner * About Us LUMMAC STEALER LEVERAGING AMADEY BOT TO DEPLOY SECTOPRAT August 11, 2023 KEY TAKEAWAYS * The blog delves into a new infection approach to disseminating the SectopRAT final payload. * Providing insight into LummaC stealer and its method of procuring the Amadey bot malware. * The Amadey bot replicates itself to ensure persistence, generating an LNK file within the startup folder directory. Upon being started, this LNK file triggers the execution of the duplicated instance of the Amadey. * Execution of the Amadey bot retrieves the SectopRAT payload through downloading, subsequently running within the victim’s system. EXECUTIVE SUMMARY LummaC, an information stealer, is being distributed through a Malware-as-a-Service (MaaS) model on Russian-speaking forums. This malware is designed to pilfer sensitive data from infected devices. Among the data targeted are cryptocurrency wallets, browser extensions, two-factor authentication codes, and various files. The Threat Actors (TAs) accountable for this malware have consistently introduced improved iterations of LummaC. This new iteration boasts several additional features, including the ability to load other malware files (introduced in version 19.07) while the main information-stealing malware is executing on the victim’s system, as mentioned in the image below. Figure 1 – New Loader feature of LummaC stealer mentioned in the TA’s Telegram channel Cyble Research & Intelligence Labs (CRIL) has recently come across a novel approach for spreading SectopRAT. This technique entails delivering the SectopRAT payload by utilizing the Amadey bot malware, which is retrieved from the LummaC stealer, as illustrated in the figure below. Figure 2 – Infection chain Detailed information about these techniques can be discussed in the Technical Analysis section. INITIAL INFECTION In most cases, the LummaC Stealer has been disseminated through phishing websites that impersonate genuine software sources, as well as via spear-phishing emails. Historically, the LummaC stealer distributed through deceptive websites like counterfeit Microsoft Sysinternals Suite. It also aimed at YouTubers by employing spear-phishing emails and was further disseminated by masquerading as illicit software cracks. TECHNICAL ANALYSIS We’ve encountered several ZIP files in the wild that seem to contain the LummaC stealer malware. It’s possible that these files are being distributed through a YouTube campaign disguised as software setup files. A few examples of these filenames include: • Newest_Setup_123_UseAs_PassKey.zip • Latest_Setup_Use__PassWord__224466.zip • Latest_Setup_Use_224466_As_PassCode.zip • Latest_Setup_Use__PassWord__224466.zip • New_PC_Setup_PassWord_UseAs_224466.zip • $#E-R1-Setup-Password-123.zip • Active_Setup_113355_UseAs_PassKey.zip • Setup_123_Passwords_Open_App.zip • Passw0rdz_113355_Open_Setup_App.zip • Active_Setup_With_224466_PassWord.zip These files appear to have been deliberately named in a way that could attract users, potentially tricking them into running the contained malware. In this technical analysis, we analyzed a sample named “Active_Setup_With_224466_PassWord.zip.” The SHA-256 hash of this ZIP archive file is 7b5500ada0bf017d0bac84b181076ebfd7220693748b9ca634f06271837edfb7. The image below illustrates the contents of a ZIP archive featuring two directories named “Common Files” and “HMService.” These directories encompass numerous legitimate DLL files, while the ZIP archive itself contains an executable called “Setup.exe.” Importantly, the “Setup.exe” serves as a payload for the LummaC Stealer executable. Figure 3 – Content of ZIP archive file The LummaC Stealer file (“Setup.exe,”), which is identified by its SHA256 hash: f85d8adf012c96a63fcb989b8b0e71894b12b769ce78f6a62064a4002954b144. This particular binary file is a 32-bit GUI-based .NET Reactor executable. LUMMAC STEALER LummaC Stealer is malware designed to gather sensitive information from compromised devices illicitly. This includes a variety of data, such as cryptocurrency wallets, browser extensions, two-factor authentication codes, and files. LummaC Stealer is offered as a service by its creators, available on underground forums and Telegram channels primarily used by Russian speakers since at least August 2022. The seller of this software has been actively marketing LummaC Stealer since April 2022, releasing new versions and responding to questions on underground forums, Telegram channels, and a dedicated website. According to the information provided by TAs, LummaC2 represents a next-gen stealer with an impressive success rate. Notably, it operates effectively even on clean systems, devoid of any dependencies whatsoever. Its key features include server-based log decryption. LummaC2 specializes in pilfering data from Chromium and Mozilla-derived browsers, encompassing about 70 browser-based cryptocurrencies and 2FA extensions. The toolkit encompasses a non-resident Loader, a dynamic low-level file grabber, and the latest innovation, the BINARY MORPHER. When the “Setup.exe” is executed, it initiates the process of injecting the malicious LummaC Stealer content into the memory of “RegAsm.exe”, as shown below. Figure 4 – LummaC stealer process tree Once successfully installed on a targeted system, LummaC Stealer orchestrates covert operations to collect important system details, such as operating system version, hardware identifiers, CPU specifications, RAM details, screen resolution, and system language. With this information, the malware extracts sensitive data from designated applications, concentrating on web browsers, cryptocurrency wallets, two-factor authentication extensions, and others. The figure below displays memory content within RegAsm.exe, containing strings associated with the URL of the LummaC Stealer’s command-and-control server. Figure 5 – LummaC C&C strings present in RegAsm memory LummaC Stealer’s impact is significant, spanning various web browsers such as Chrome, Mozilla Firefox, Microsoft Edge, and others. Within these environments, the stealer gains access to browsing histories, internet cookies, login details, personal data, credit card information, and other valuable data. After gathering all the sensitive information from the targeted system, the stealer encrypts the collected data and sends it to the C&C server, as depicted in the image below. * hxxp[:]//exitlife[.]xyz/c2sock Figure 6 – LummaC C&C communication CRIL has already published a comprehensive blog post offering a detailed examination of LummaC Stealer. The blog can be accessed here. Furthermore, the LummaC Stealer retrieves the Amadey bot malware by downloading it from the following URL, as depicted in the below figure. * hxxp[:]//africatechs[.]com/Amdaygo[.]exe Figure 7 – Presence of Amadey payload URL in LummaC memory AMADEY BOT Amadey Bot is a type of malware that was identified in 2018. It can carry out tasks like exploring compromised systems, gathering data, and loading additional malicious payloads. During its early stages, it was disseminated through exploit kits. TAs used it to introduce different types of malware, including the GrandCrab ransomware and the Flawed Ammyy Remote Access Trojan (RAT). In 2022, associates linked to the LOCKBIT group employed the Amadey bot to distribute ransomware to their targets. The Amadey bot, once retrieved by the LummaC Stealer, is saved and executed within the Temp directory with the below-specified filename: * C:\Users\user\AppData\Local\Temp\hhwjilxtgukpvvhbpo.exe The Amadey bot is a 32-bit GUI type .NET Reactor executable with sha256 d35d55bb74a7cf4349e2fa4a92839e2a88f17a1fee9725801d0d97b2bf0d311c. After being executed, the Amadey malware copies itself to the following location and executes it. * C:\Users\user\Videos\edddegyjjykj.exe Additionally, it creates an LNK file that, when clicked, executes the dropped copy of itself “edddegyjjykj.exe” file. This LNK file is dropped into the below startup folder location to maintain persistence. * C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\edddegyjjykj.lnk During the execution, Amadey establishes communication with its C&C server, regularly transmitting system details such as OS version, architecture, username, installed antivirus software, etc. Additionally, it queries the server to receive instructions. The primary feature of Amadey is its capability to deploy other payloads to all compromised computers or selectively to those targeted by the malware. The below figure illustrates the malware sending system information to the C&C server through the following URL: * hxxp[:]//45[.]9[.]74[.]182/b7djSDcPcZ/index[.]php Figure 8 – Amadey exfiltration CRIL has previously released an extensive blog post that provides an in-depth analysis of Amadey Bot. It can be accessed here. Moreover, the malware downloads an additional malicious payload from the following URL, as mentioned in the figure below. * hxxp[:]//patriciabono[.]com/BRR[.]exe Figure 9 – Amadey C&C communication The image below depicts the malware’s memory content, including strings related to the Amadey bot’s C&C server, as well as the URL for the SectopRAT payload. Figure 10 – Presence of SectopRAT payload URL in Amadey memory SECTOPRAT SectopRAT (aka Arechclient) is a Remote Access Trojan (RAT) built using the .NET compiler. It boasts a wide array of functionalities, including the pilfering of browser data and cryptocurrency wallet details. It can establish a concealed secondary desktop, which it uses to oversee and manipulate browser sessions. Notably, SectopRAT is equipped with Anti-VM and Anti-Emulator mechanisms intended to complicate malware analysis. These techniques alter the malware’s behavior within environments designed for analysis, making it challenging to discern its true malicious nature. After being downloaded by Amadey, the SectopRAT is stored and executed in the Temp directory using the below folder and filename: * C:\Users\user\AppData\Local\Temp\1000349051\BRR.exe The SectopRAT is a 32-bit executable, protected using the Themida packer, and its SHA256 is 501444c9d25c15ca62bafe062b6bb8a3b3f69f0ca13aff057e3b8b1a0595f3a4. Once the “BRR.exe” is executed, the malware begins scanning through the target system’s directories. It aims to retrieve sensitive data from files such as “Cookies,” “Local State,” “Login Data,” and “Web Data.” These files are sourced from a diverse array of over 35 web browsers, gaming platforms, and other software applications that have been installed on the compromised system. The following figure illustrates the browsers, games, email clients, and other software that the malware focuses on to extract sensitive information. Figure 11 – SectopRAT target application list to steal sensitive information Furthermore, it can steal important details from various cryptocurrency wallets such as Atomic, Exodus, Electrum, and Daedalus Mainnet. The malware has the capability to not only access cryptocurrency wallets through specific directories but it can also retrieve data from crypto wallet browser extensions, as mentioned in the table below. ckpaelocniggkheibcacecnmmlmeodfa CryptoBit ibnejdfjmmkpcnlpebklmnkoeoihofec TronLink fhbohimaelbohpjbbldcngcnapndodjp Binance Wallet nkbihfbeogaeaoehlefnkodbefgpgknn MetaMask SectopRAT connects to the C&C server for communication using the below IP:Port, * 95[.]143[.]190[.]57:15648 The below image depicts the activity associated with the initialization string. This string acted as a signal that the encryption status for the malware’s operations had been switched to “on” within the compromised system. Figure 12 – SectopRAT memory strings Figure 12 – SectopRAT memory strings CONCLUSION The deliberate introduction of multiple malware strains strategically enhances the capabilities and control of the threat actors (TAs) over the compromised system. This integration empowers them to carry out a diverse range of malicious activities, starting from the initial breach and extending to data extraction and the potential for remote control access. Through these intricate maneuvers, the likelihood of evading detection is heightened, allowing for a prolonged presence within the system and effectively achieving their malicious goals. The most recent iteration of LummaC stealer now possesses the capability to load additional malware into the targeted system. In this particular campaign, LummaC stealer is utilized to retrieve and install the Amadey bot, recognized for its tasks involving system assessment, data theft, and the deployment of supplementary malicious payloads. Subsequently, the Amadey bot is executed to fetch SectopRAT, a .NET Remote Access Trojan recognized for its diverse functionalities, including various undetected methods. OUR RECOMMENDATIONS We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below: * Implement sophisticated email filtering solutions to detect and prevent spam, phishing attempts, and malicious emails. * Refrain from accessing links and attachments from unfamiliar or untrusted sources. Always confirm the credibility of the sender before engaging with links or attachments * Download and install software applications solely from reputable and well-established sources. Avoid obtaining software from online sources that lack credibility or verification. * Install a reliable antivirus and comprehensive internet security suite on all devices. Regularly update and scan for potential threats to ensure ongoing protection. * Utilize URL filtering tools to block access to known malicious websites and domains. Prevent users from inadvertently downloading malware from dangerous URLs. * Conduct periodic cybersecurity training sessions for employees. Educate them about the latest threats, phishing tactics, and the risks of email attachments and links. * Emphasize the importance of not downloading or executing files from unknown sources. Raise awareness about the potential consequences of interacting with suspicious content. * Set up network-level monitoring to detect unusual activities or data exfiltration by malware. Block suspicious activities to prevent potential breaches. MITRE ATT&CK® TECHNIQUES Tactic Technique ID Technique Name Execution T1204 T1047 User Execution Windows Management Instrumentation Persistence T1547.001 Registry Run Keys / Startup Folder Privilege Escalation T1055 Process Injection Defense Evasion T1497 T1027 T1562T1027.002T1140 T1620 Virtualization/Sandbox Evasion Obfuscated Files or Information Disable or Modify ToolsSoftware Packing Deobfuscate/Decode Files or Information Reflective Code Loading Credential Access T1003 T1056 OS Credential Dumping Input Capture Discovery T1057 T1012 T1082 T1083 T1518.001 Process Discovery Query Registry System Information Discovery File and Directory DiscoverySecurity Software Discovery Collection T1005 Data from Local System C&C T1071 T1573 T1105 Application Layer Protocol Encrypted Channel Ingress Tool Transfer INDICATORS OF COMPROMISE (IOCS) Indicators Indicator Type Description 507bddfabd74a3d024b2ad5f67d666ea 78eac92e0040e033406e6786b58b8a367fe171fa f85d8adf012c96a63fcb989b8b0e71894b12b769ce78f6a62064a4002954b144 MD5 SHA1 SHA256 LummaC Stealer exe 952d825a264745bb52b6977ba5983568 627a0a841c2fe194dd54f9ec6b0c1231d7da135f d35d55bb74a7cf4349e2fa4a92839e2a88f17a1fee9725801d0d97b2bf0d311c MD5 SHA1 SHA256 Amadey Bot exe f290ed868caae994bbfae1b63aca1d28 5ac7b60e56281dc0c72f7c1125b165867df56ed9 501444c9d25c15ca62bafe062b6bb8a3b3f69f0ca13aff057e3b8b1a0595f3a4 MD5 SHA1 SHA256 SectopRAT exe hxxp[:]//exitlife[.]xyz/c2sock URL LummaC stealer C&C hxxp[:]//africatechs[.]com/Amdaygo[.]exe URL Amadey Payload URL hxxp[:]//45[.]9[.]74[.]182/b7djSDcPcZ/index[.]php URL Amadey C&C hxxp[:]//patriciabono[.]com/BRR[.]exe URL SectopRAT Payload URL 95[.]143[.]190[.]57:15648 IP:Port SectopRAT C&C ca21c5b129c001c2b51359d5f74c0a99667028810623b779190b13f0de86369e 929f7b467d96d8d9c73bfa9b8adf758c1b3993c9438f23368c69e1201beea622 515ab212127cc722326043d77dda60943145798bfe8b17178937a254989367f1 0d8dee5e24500219f037e673324479f22cc5649c2aafdfe47b35375b6b76e60b e0ac5909e219d4527691ea695185313376a0ccb075907b1deecd4e2aeae42cba 9252e999b76b9628ad0942df2649e1203ca078d1b45dab6a8f1ede3e22b99625 51cb8641ed75c5037fa657ed2aa33c71350e01f5f949054f17582ca41c260280 f819a1d2234c2755a8dc844f89e765de56c1c927f3964a1453961cec4fd38bae SHA256 Similar LummaC Stealer exe files 0539d46a6e61dd3ce32a4b41c0554f925f4b26054c49451accec7ccad0409846 2c256a4a1ac022bcd3784d19e66934056015e20b49d58238ce4f3dfb37bfd98d SHA256 Similar Amadey exe files a3ceda3ef0a7b72145124def334dd3fa337614a1170960826016996151188fc5 033cafb9fcd3d50d858164c117ee2a1c9e7fe95b4d027315bc9d1186e655d583 81f4e0d6a70f14c3e07241196bd7f5318e302c28c64ca4bb876f4e25fbc3e5d2 ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd 501444c9d25c15ca62bafe062b6bb8a3b3f69f0ca13aff057e3b8b1a0595f3a4 fb553e12381d42a612c713968078424201794a35fd13c681ae7faa77bf18e553 641710df66c792439f85b79879a268caa17b78ea0bf6924369fa6131fda01cd5 SHA256 Similar SectopRAT exe files hxxp://enfantfoundation[.]com/amday[.]exe URL Similar AmadeyPayload URL hxxp://fuji-iasi[.]ro/BRR[.]exe hxxps://earthqik[.]co[.]za/BR[.]exe hxxp://silversoft[.]in/BR[.]exe hxxp://tbmcoats[.]com/BRRR[.]exe hxxp://aviangas[.]co[.]ke/BRRRRAS[.]exe URL Similar SectopRAT Payload URL ET RULES Malware 2046637 ET MALWARE [ANY.RUN] Win32/Lumma Stealer Configuration Request Attempt LummaC Stealer 2039423 ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M1 2043206 ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 2039425 ET MALWARE Win32/Lumma Stealer CnC Domain (765mm .xyz) in DNS Lookup 2045751 ET MALWARE Win32/Amadey Bot Activity (POST) M2 Amadey Bot 2045752 ET MALWARE Win32/Amadey Payload Request (GET) 2044623 ET MALWARE Amadey Bot Activity (POST) 2044695 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M1 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 YARA RULES rule LummaC_Stealer { meta: author = “Cyble” description = “Detects LummaC Stealer Files” date = “2023-08-10” os = “Windows” threat_name = “LummaC Stealer” scan_type = “Memory” severity = 100 reference_sample = “a53dafb72659e7aa4f36a6626b01aad9cc44500d5d4c1ee7a96c957a4e556d02” strings: $a = “/c2sock” ascii wide $b = “TeslaBrowser” ascii wide $c = “Software.txt” ascii wide $d = “System.txt” ascii wide $e = “/c2conf” ascii wide condition: all of them } rule AmadeyBot { meta: author = “Cyble” description = “Detects Amadey Bot Files” date = “2023-08-10” os = “Windows” threat_name = “Amadey Bot” scan_type = “Memory” severity = 100 reference_sample = “a58f0d4b2a0100a12eb8a5690522d79d510adafa9235d11e4b714dda8c87b341” strings: $a = “/index.php” ascii wide $b = “\\MsBuild.exe” ascii wide $c = “id=” ascii wide $d = “&av=” ascii wide $e = “&pc=” ascii wide $f = “&un=” ascii wide condition: all of them } rule SectopRAT { meta: author = “Cyble” description = “Detects SectopRAT Files” date = “2023-08-10” os = “Windows” threat_name = “SectopRAT” scan_type = “Memory” severity = 100 reference_sample = “75e64bd57bfaad471d202d46b726473ccf2182d9d511a32304903324648a90b1” strings: $a = “\\User Data” ascii wide $b = “EncryptionStatus\”,\”Status” ascii wide $c = “BotName” ascii wide $d = “BotOS” ascii wide $e = “URLData” ascii wide $f = “Web Data” ascii wide $g = “User Data\\Local State” ascii wide condition: all of them } RELATED THE RISE OF AMADEY BOT: A GROWING CONCERN FOR INTERNET SECURITY Cyble Research & Intelligence Labs analyzes how Amadey bot pushes password stealing and clipper module to infect users. January 25, 2023 In "Trojan" JESTER STEALER: AN EMERGING INFO STEALER Cyble Research Labs have been actively monitoring various stealers, and recently we came across a malware sample which turned out to be Jester Stealer. Jester Stealer is an Info Stealer, which steals your sensitive information such as login credentials, cookies, credit card details, etc., and sends the exfiltrated data to… February 24, 2022 In "Darkweb" A CLOSER LOOK AT ETERNITY MALWARE In this analysis, Cyble looks at the Eternity Malware suite, listing a wide variety of malware for sale on Telegram. May 12, 2022 In "Cryptominer" Post navigation ← Previous Post RELATED POSTS DEEP DIVE ANALYSIS – BORAT RAT 32 Comments / Ransomware, Remote Access Trojan, Spyware, Trojan / By cybleinc Cyble Research Labs analyzes Borat , a sophisticated RAT variant that boasts a combination of Remote Access Trojan, Spyware, Ransomware and DDoS capabilities. Read More » UNDER THE LENS: EAGLE MONITOR RAT Malware, Phishing, Remote Access Trojan, Spyware, Trojan / By cybleinc Cyble looks at the recently resurfaced Eagle Monitor RAT and the new TTPs encountered in this iteration of the popular RAT. Read More » Search for: RECENT POSTS * LummaC Stealer Leveraging Amadey Bot to Deploy SectopRAT * AgentTesla Malware Targets Users with Malicious Control Panel File * Utilization of Leaked Ransomware Builders in Tech-Related Scams * STRRAT’s Latest Version Incorporates Dual Obfuscation Layers * Sophisticated SiMay RAT Spreads Via Telegram Phishing Site CATEGORIES * 2020 * 2021 * 2022 * 2023 * Adware * All * Android * Annoucement * APK Ransomware * APT * Banking Trojan * Banking Trojan * Clipper * Cryptocurrency * Cryptominer * Cyberattack * Cybercrime * Cyberwarfare * Darkweb * Data Breach * Data Leak * DDOS * Elasticsearch * Exploit * Exploit * Fake App * Fraud * General * Hacktivism * ICS/SCADA * Industrial Control Systems * Infostealer * Malware * OSINT * Phishing * Press * Ransomware * Red Teaming * Remote Access Trojan * Scam * Spyware * Stealer * Tech Scam * Telecommunications * Trojan * Vulnerability QUICK LINKS Main Menu * Home * About Us * Blog * Press * Cyble Partner Network (CPN) * Responsible Disclosure PRODUCTS Main Menu * Cyble Vision * Cyble Hawk * AmIBreached * Cyble Odin * The Cyber Express SOLUTIONS Main Menu * Dark Web & Deep Web * Attack Surface Management * Brand Intelligence * Cyber Threat Intelligence * Vulnerability Management * Takedown and Disruption PRIVACY POLICY Main Menu * Cyble Vision * AmIBreached © 2023. Cyble Inc.(Leading Cyber Threat Intelligence Company). All Rights Reserved Twitter Linkedin Youtube Scroll to Top Loading Comments... Write a Comment... Email Name Website We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok × We Value Your Privacy Settings NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar technologies on this site and use personal data (e.g., your IP address). If you consent, the cookies, device identifiers, or other information can be stored or accessed on your device for the purposes described below. You can click "Allow All" or "Decline All" or click Settings above to customize your consent. NextRoll and our advertising partners process personal data to: ● Store and/or access information on a device; ● Create a personalized content profile; ● Select personalised content; ● Personalized ads, ad measurement and audience insights; ● Product development. For some of the purposes above, our advertising partners: ● Use precise geolocation data. Some of our partners rely on their legitimate business interests to process personal data. View our advertising partners if you wish to provide or deny consent for specific partners, review the purposes each partner believes they have a legitimate interest for, and object to such processing. If you select Decline All, you will still be able to view content on this site and you will still receive advertising, but the advertising will not be tailored for you. You may change your setting whenever you see the Manage consent preferences on this site. Decline All Allow All Manage consent preferences