Weaponized Ebooks Unleashed: How AsyncRAT is Targeting Your Devices

Malware distributors are using social engineering tactics to spread AsyncRAT, as malicious actors have been disguising the malware as common file types, such as questionnaires (.chm, .wsf, and .lnk), to trick users into opening them. 

More recently, they’ve been employing ebooks as a disguise to further their obfuscation efforts, by leveraging the user’s trust in legitimate file formats to bypass suspicion and gain access to the system. 

 An ebook being distributed with the malware

The attacker utilizes a compressed file disguised as an ebook to deliver a multi-stage payload, which contains a malicious LNK file disguised as a compressed file icon, a PowerShell script hidden within a text file (RM.TXT), and additional compressed files disguised as video files. 

The LNK file executes the PowerShell script found in RM.TXT, which hides the folder containing the downloader malware and then obfuscates itself before scanning for security software. Depending on the security software presence, the script executes the downloader malware hidden within the disguised video files.   

RM.TXT containing a malicious PowerShell script

The malware decompresses a file (4.mkv) and registers a malicious script (NTUSER.BAT{428f9636-1254-e23e3-ada2-03427pie23}.TM.VBS) as a “BitTorrent Certificate” task in Task Scheduler. 

It gathers system information and executes a batch file (NTUSER.BAT{428f9636-1254-ee23-ada2-080027dede23}.TM.bat) that launches a PowerShell script. 

The PowerShell script then decrypts and loads obfuscated PE files (NTUSER.DAT{428f1209-1254-13ef-ada4-080027dede23}.TxR.blf and NTUSER.DAT{4280000a-1254-11ef-ada2-080007dede23}.TM.blf) to deploy AsyncRAT.  

Part of the PowerShell code that decrypts and executes the data file

The malware employs three methods for delivering the AsyncRAT payload, by decompressing a specific archive (5.mkv) and creating a task schedule to run a VBS script hidden within the archive under the name “BitTorrent.”. 

This VBS script leverages a batch file to execute an AutoHotKey script, ultimately downloading AsyncRAT from a predetermined URL for execution. 

It also utilizes a similar approach but with a different archive (8.mkv) and a PowerShell script disguised under the name “USER ID Converter” within the compressed file, while the obfuscated PowerShell script directly executes AsyncRAT in the same directory.  

AutoHotKey script

According to AhnLab Security Intelligence Center, AsyncRAT is malware with features to evade detection, persist on the system, steal user information, be instructed remotely to perform malicious actions, and be disguised as various file types, including executable files, text files, and shortcuts. 

Recent detections include trojanized versions of video subtitle files, text files, religious ebooks, and compressed archives, including indicators of compromise to identify this malware: specific MD5 hashes, a C&C server domain name, and a malicious download URL.  

Also Read:

Kaaviya
Kaaviyahttps://cyberpress.org/
Kaaviya is a Security Editor and fellow reporter with Cyber Press. She is covering various cyber security incidents happening in the Cyber Space.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here