CRAT Aims To Plunder Your Endpoints

CRAT Aims To Plunder Your Endpoints

By Asheer Malhotra.Cisco Talos has observed a new version of a remote access trojan (RAT) family known as CRAT.
Apart from the prebuilt RAT capabilities, the malware can download and deploy additional malicious plugins on the infected endpoint.
One of the plugins is a ransomware known as "Hansom."
CRAT has been attributed to the Lazarus APT Group in the past.
The RAT consists of multiple obfuscation techniques to hide strings, API names, command and control (C2) URLs and instrumental functions, along with static detection evasion.
The attack also employs a multitude of anti-infection checks to evade sandbox based detection systems.

What's new?


Cisco Talos has recently discovered a new version of the CRAT malware family. This version consists of multiple RAT capabilities, additional plugins and a variety of detection-evasion techniques. In the past, CRAT has been attributed to the Lazarus Group, the malicious threat actors behind multiple cyber campaigns, including attacks against the entertainment sector.

Indicators and tactics, techniques and procedures (TTPs) discovered by this investigation resemble those of the Lazarus Group.

How did it work?


The attack consists of a highly modular malware that can function as a standalone RAT and download and activate additional malicious plugins from its C2 servers. Cisco Talos has discovered multiple plugins so far, consisting of ransomware, screen-capture, clipboard monitoring and keylogger components.

So what?


This attack demonstrates how the adversary operates an attack that:Uses obfuscation and extensive evasion techniques to hide its malicious indicators.
Has evolved across versions to achieve effectiveness of their attack.
Employs a highly modular plugin framework to selectively infect targeted endpoints.
Most importantly, it deploys RAT malware to ransack the endpoint, followed by deployment of ransomware to either extort money or burn ..

Support the originator by clicking the read the rest link below.