AsyncRAT Reloaded: Using Python and TryCloudflare for Malware Delivery Again

A new AsyncRAT malware campaign has been identified, utilizing malicious payloads delivered through TryCloudflare quick tunnels and Python packages. The attack chain begins with a phishing email containing a Dropbox URL, leading to a ZIP file with an internet shortcut. This triggers a series of downloads, ultimately executing AsyncRAT malware via Python scripts. The campaign employs legitimate infrastructure like Dropbox and TryCloudflare to evade detection. It uses a multi-step process involving LNK, JavaScript, and BAT files, culminating in the extraction of malicious Python scripts. The attackers use process injection techniques to inject shellcode into legitimate processes like notepad.exe and explorer.exe. This sophisticated approach highlights the evolving nature of cyber threats and the exploitation of legitimate services for malicious purposes. Author: AlienVault

Related Tags:
evasion techniques

T1059.006

remote access trojan

T1204.002

T1059.001

T1129

python

AsyncRAT

DropBox

Associated Indicators:
784F004BB7683C74758FB1D294627177E1CE93815B4F1B69964C93089FF27C63

8EF36A4865F4A73A4E8FE4B90E5EFF4A7FEB3647

55724B766DD1FE8BF9DD4CB7094B83B88D57D945

0AA1B8FBA8D7BD19A0064EDFDF86C027DA253644

FF6186EEF1C17A2668C6013D38FECEAD4F507556

4747EE49BDF31351C025049D8C3B7FEF831BE77C

AE1DECE09C2B627D8D3FE1C1F758DB9CA6D5820C

8DC9071A46A019547C8355A155D9C3C3B154E7A2

659ECDEB19B8E49BE61FE41E8796D1215272B16E