RedCurl APT leveraging Active Directory Explorer & 7-Zip To Archive Exfiltrated Data

In a sophisticated cyber espionage campaign discovered in January 2025, the RedCurl APT group (also known as EarthKapre) has been observed targeting law firms and corporate organizations with a focus on corporate espionage.The threat actors employ a multi-stage attack chain that leverages [legitimate tools](https://cybersecuritynews.com/pure-malware-tools/) for data exfiltration, making their activities difficult to detect using conventional security measures.The campaign was identified when the attackers used a legitimate Adobe executable (ADNotificationManager.exe) to sideload their malicious loader.This technique allowed them to bypass security controls while executing their [malware](https://cybersecuritynews.com/flexibleferret-malware-attacking-macos-users/) on target systems.The initial access vector involved an Indeed-themed phishing PDF that contained links to a zip archive with a mountable ISO file. ![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEUT7M5QoVIGDrFKf5sKTP8Yu6TJXCmrME9XK0j6hkrM4ERH0zngQ-c0iIC3h01RSQSHCNP2LszjGULntr6E9STIGDj5bAVb1D4UhRSR8wsLSlVa4SXFSovrNF-lX4r_oXhCVEj2mM1enR2KFUXKvWo9i8rQoovw6MG9_1glhh80sMt1NVmn8phNVHHSM/s16000/Indeed-themed%20phishing%20pdf%20(Source%20-%20Esentire).webp) Indeed-themed phishing pdf (Source — Esentire)Analysts at eSentire’s Threat Response Unit (TRU) [identified](https://www.esentire.com/blog/unraveling-the-many-stages-and-techniques-used-by-redcurl-earthkapre-apt) that upon opening the mounted ISO file, victims would see only a single SCR file disguised as a CV application, which when executed would initiate the attack chain.’The victim sees a single file, ‘CV Applicant -*.scr’ which is the legitimate signed Adobe executable ‘ADNotificationManager.exe’. After the victim opens the file, the EarthKapre loader (netutils.dll) is side loaded,’ the report states.The multi-stage attack includes sophisticated string encryption techniques utilizing bcrypt.dll APIs to generate SHA256 hashes for AES key derivation. ![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRf2Bj6gjBzd7qjqmkv1UbvztPa582mnV3OS_JUF1tVzrFddnjhmK8JGR1tPtpilhU1mVRPlZufJDBOTHIx1hsCR5Sytlm1BKXYj1dKp82tNkxBWXJjy1rrOJsiZjXjpiavrVPEFHdimTz9l09Sekts7DDE-pi2TttM4iMzfZvfaq9XSLYq3Zvvtr8zoY/s16000/Attack%20chain%20(Source%20-%20Esentire).webp) Attack chain (Source — Esentire)Each stage communicates with command and control servers hosted on [Cloudflare](https://cybersecuritynews.com/cloudflare-under-attack-mode-basic-guide/) Workers infrastructure, retrieving subsequent payloads and exfiltrating stolen data.**Reconnaissance and Exfiltration Techniques**———————————————-For reconnaissance and data collection, RedCurl deploys a batch file to %APPDATA%–Acquisition– that executes multiple system commands to gather information about user accounts, installed software, system configurations, and network resources.Particularly notable is their use of Sysinternals Active Directory Explorer for domain enumeration, as seen in the command: ‘temp7237–ad.exe -accepteula -snapshot ” temp7237–dmn.dat’.The attackers then leverage 7-Zip to archive and password-protect the collected data with commands like: ‘powershell -c ‘gci …exe -| foreach {if(($_.VersionInfo).InternalName -eq ‘7za’) {$syspack = $_.Fullname}};$a1=’x’;$a2=’-aoa’;$a3=’-p’+$env:ppass2;$a4=$env:util;$a5=’-o’+$env:tdir;-&$syspack $a1 $a2 $a3 $a4 $a5;’Final exfiltration occurs via PowerShell PUT requests to cloud storage provider ‘Tab Digital,’ completing the attack chain that begins with phishing and ends with the theft of potentially sensitive corporate data.******Are you from SOC/DFIR Teams? — Analyse Malware Incidents & get live Access with ANY.RUN -> [Start Now for Free](https://any.run/demo?utm_source=csn&utm_medium=article&utm_campaign=ti_feeds&utm_content=demo&utm_term=110325).******The post [RedCurl APT leveraging Active Directory Explorer -& 7-Zip To Archive Exfiltrated Data](https://cybersecuritynews.com/redcurl-apt-leveraging-active-directory-explorer/) appeared first on [Cyber Security News](https://cybersecuritynews.com).

Related Tags:
NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 334 – Computer And Electronic Product Manufacturing

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 52 – Finance And Insurance

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 33 – Manufacturing – Metal

Electronics And Other

NAICS: 523 – Securities

Commodity Contracts

Other Financial Investments And Related Activities

NAICS: 51 – Information

TA0010 – Exfiltration

Associated Indicators: