web analytics

New Malware Alert: EarlyRAT Linked to North Korean Hacking Group – Source: heimdalsecurity.com

Rate this post

Source: heimdalsecurity.com – Author: Cristian Neagu

A previously undocumented remote access trojan (RAT) has been discovered by security analysts. Dubbed ‘EarlyRAT’, the trojan is believed to be used by Andariel, a sub-group of the North Korean state-sponsored hacking group Lazarus.

Also known as Stonefly, Andariel is known for employing the DTrack modular backdoor to collect information from compromised systems, such as browsing history, typed data (keylogging), screenshots, running processes, and more.

EarlyRAT Explained: How It Operates?

The group uses EarlyRAT to gather system information from breached devices and send it to the attacker’s C2 (command and control) server.

The malware was discovered while investigating an Andariel campaign from mid-2022, where the threat actors were leveraging Log4Shell to breach corporate networks. Andariel performed network reconnaissance, credential stealing, and lateral movement using open-source tools like 3Proxy, Putty, Dumpert, and Powerline by taking advantage of a vulnerability in the Log4j software.

Additionally, the analysts discovered a phishing document in these assaults that employed macros to retrieve an EarlyRAT payload from a server connected to previous Maui ransomware campaigns.

EarlyRAT is a straightforward program that immediately starts gathering system data and sending it via a POST request to the C2 server.

The execution of commands on the infected system is EarlyRAT’s second main purpose, which might be used to download more payloads, exfiltrate vital information, or interfere with system operations.

According to BleepingComputer, security researchers say that the tool is very similar to another one used by Lazarus, MagicRAT, whose functions include the creation of scheduled tasks and downloading additional malware from the C2.

Based on analyses conducted, the malware seems to be executed by an inexperienced human operator, given the number of mistakes and typos. It was noted that a number of commands were manually entered rather than being hardcoded into the compromised network devices, frequently resulting in typos.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.

If you liked this post, you will enjoy our newsletter.

Get cybersecurity updates you’ll actually want to read directly in your inbox.

Original Post URL: https://heimdalsecurity.com/blog/new-malware-alert-earlyrat-linked-to-north-korean-hacking-group/

Category & Tags: Cybersecurity News – Cybersecurity News

Views: 0

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts