Dridex/Locky Operators Unleash New Malware in Recent Attack
#1
Quote:The threat actor(s) behind many Dridex and Locky campaigns have been using a new Remote Access Trojan (RAT), Proofpoint security researchers warn. 

Known as TA505, the attackers have been using malware dubbed tRat, which was written in Delphi and is modular in nature. The new piece of malware was first spotted at the end of September, when it was being spread by an unattributed actor. Malicious Word documents used in the attack used macros to download the RAT.

tRat, the security researchers say, achieves persistence by copying the binary to a directory in the AppData folder. Next, it creates a LNK file in the Startup directory to ensure the binary is executed when the system starts. 

The malware uses TCP port 80 for command and control (C&C) communications, encrypting data and transmitting it hex-encoded. The initial network request sent to the server includes system information such as computer name, system username, and tRat bot ID. 

“Currently, we believe that the only supported command in the loader is "MODULE," which contains at least a module name and export name,” the security researchers reveal

Source: https://www.securityweek.com/dridexlocky...ent-attack
[-] The following 2 users say Thank You to silversurfer for this post:
  • harlan4096, wwd
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Manjaro Linux 26.0.4 Build 260327
Manjaro Linux 26.0...harlan4096 — 09:46
K-Lite Codec Pack 19.6.0 / 19.6.3 Update
Changes in 19.6.3 ...harlan4096 — 09:45
AdGuard Browser Extension 5.3.1.7
AdGuard Browser Ex...harlan4096 — 09:44
uBOLite 2026.329.1951 (already available...
uBOLite 2026.329.1...harlan4096 — 09:43
Sandboxie Sandboxie-Plus v1.17.3 / 5.72....
Release v1.17.3 / ...harlan4096 — 09:42

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>