A recent analysis by Outpost24’s KrakenLabs has shed light on EncryptHub, a sophisticated cybercriminal entity employing multi-stage malware campaigns to compromise systems and exfiltrate sensitive data.
EncryptHub’s tactics involve using trojanized applications and third-party distribution services to spread malicious payloads, often evading detection by mimicking legitimate software.
Distribution Channels and Tactics
EncryptHub has been observed distributing trojanized versions of popular applications such as QQ Talk, WeChat, and Microsoft Visual Studio 2022.
These counterfeit applications are designed to appear trustworthy, bypassing user suspicion and some automated security checks.
Once installed, they serve as a conduit for further malicious payloads, enabling data exfiltration and lateral movement within compromised systems.
Additionally, EncryptHub utilizes third-party Pay-Per-Install (PPI) services like LabInstalls to streamline malware distribution.

This service automates the installation process, obscuring the malicious origins of the payloads and expanding the reach of EncryptHub’s campaigns.
EncryptHub’s operational security lapses have inadvertently exposed key elements of their infrastructure, including directory listings and Telegram bot configurations used for data exfiltration.
Acccording to Outpost24’s KrakenLabs Report, these oversights have allowed researchers to dissect their attack chain in unprecedented detail.
The threat actor prioritizes stolen credentials based on attributes like cryptocurrency ownership and corporate network affiliation, indicating a focus on high-value targets.
Evolving Killchain and EncryptRAT Development
EncryptHub’s attack chain involves multiple stages, starting with the execution of a PowerShell script (payload.ps1
) that steals sensitive data, including messaging sessions, crypto wallets, and password manager files.
Subsequent stages involve the deployment of additional scripts and executables, culminating in the installation of Rhadamanthys malware.
Alongside these campaigns, EncryptHub is developing EncryptRAT, a remote access tool featuring a command-and-control (C2) panel.

This tool is expected to be commercialized soon, allowing other threat actors to manage infections and configure malware samples.
The evolving nature of EncryptHub’s tactics underscores the need for continuous monitoring and proactive defense strategies.
As cybersecurity threats continue to adapt, organizations must remain vigilant and adopt multi-layered security measures to mitigate risks from sophisticated adversaries like EncryptHub.