Skip to content

Cybercrooks are phishing via ScrubCrypt tool to deploy VenomRAT

  • by
  • 3 min read

Photo: wk1003mike / Shutterstock.com

Threat actors are using intricate tactics and tools, including ScrubCrypt, an antivirus evasion tool renowned for converting executables into undetectable batch files, to deploy VenomRAT, a potent remote access trojan (RAT).

The attack initiation involves the distribution of phishing emails containing malicious Scalable Vector Graphics (SVG) fields. These emails entice unsuspecting victims to click on attachments, leading to the deployment of VenomRAT, a sophisticated malware with extensive capabilities for system manipulation.

ScrubCrypt plays a strategic role in the attack’s evasion and persistence strategies. It employs AES-CBC decryption and GZIP compression to obfuscate its payloads, rendering them obscure to security systems. This level of obfuscation extends to the BatCloak tool, which is used to obscure batch files and further evade detection.

This is an image of scrubcrypt phishing email
A sample of phishing email. | Source: Fortinet

Upon successful execution, VenomRAT establishes a connection with a command and control (C2) server, granting threat actors remote control over compromised systems. The attack’s sophistication is evident in VenomRAT’s ability to bypass security measures like AMSI (Antimalware Scan Interface) and ETW (Event Tracing for Windows), enabling it to operate stealthily within victim environments.

Fortinet researchers discovered that the attackers enhanced their capabilities by deploying plugins alongside VenomRAT. These plugins, including NanoCore, Remcos, XWorm, and a specialised stealer for crypto wallets, expanded the attack’s reach, facilitating keylogging, data theft, and unauthorised system access.

NanoCore, a notorious RAT known for remote control functionalities, is distributed via obfuscated VBS files and employs steganographic methods to conceal malicious code within images. Remcos, originally legitimate remote management software, is repurposed to gain complete control over compromised systems, capturing sensitive information like keystrokes and credentials.

This is an image of scrubcrypt attack chain
Attack chain. | Source: Fortinet

The attackers maintain sophisticated evasion and persistence techniques throughout the process. ScrubCrypt’s cluttered and obfuscated bath files and VenomRAT’s use of scheduled tasks and PowerShell commands create layers of obfuscation against detection and mitigation efforts.

Furthermore, the attackers demonstrate adaptability by leveraging multiple distribution channels, such as phishing emails, obfuscated scripts, and PowerShell commands via Guloader, ensuring widespread infiltration and operational success.

Researchers have urged users to take measures to implement advanced threat detection, employee training, establishing endpoint security, and continuous monitoring to mitigate the threat of these attacks.

In the News: 92,000 D-Link devices exposed to command injection and backdoor

Kumar Hemant

Kumar Hemant

Deputy Editor at Candid.Technology. Hemant writes at the intersection of tech and culture and has a keen interest in science, social issues and international relations. You can contact him here: kumarhemant@pm.me

>