DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan
#1
Quote:New malicious campaigns attributed to DarkHydrus APT group show the adversary's use of a new variant of the RogueRobin Trojan and of Google Drive as an alternative command and control (C2) communication channel.

The group's latest activity was observed against targets in the Middle East, luring them with Excel documents laced with malicious VBA code (macro).

For security reasons, macros are disabled by default in the Microsoft Office suite, and they do not run unless the user enables the feature manually.

According to research from Palo Alto Networks' Unit 42, the text file hides a Windows Script Component (.SCT) file that delivers a version of the RogueRobin trojan. Originally, this custom payload is PowerShell-based, but it looks like the threat actor ported it to a compiled variant.

In a report this week, Unit 42 writes that "in addition to checks for common analysis tools running on the system. The Trojan also checks to see if a debugger is attached to its processes and will exit if it detects the presence of a debugger."

Source: https://www.bleepingcomputer.com/news/se...in-trojan/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Recover Corrupted EDB to PST
If you want to recov...AlbertTaylor — 10:40
Recover Corrupted EDB to PST
Safely recover your ...Jyoti_baghel — 05:25
GFYI [Official] AirVPN 2025 Christmas / ...
  We at Geeks For Y...jasonX — 20:47
GFYI [Official] Macrium Reflect X Home E...
  We at Geeks For ...jasonX — 20:39
GFYI [Official] Hasleo Backup Suite Vers...
  We at Geeks For ...jasonX — 20:32

[-]
Birthdays
Today's Birthdays
avatar (41)Enlargedterrestrial20
Upcoming Birthdays
avatar (43)ivyhuv

[-]
Online Staff
zevish's profile zevish

>