January 25, 2025
Hackers Use Microsoft MSC Recordsdata to Deploy Obfuscated Backdoor in Pakistan Assaults

Dec 17, 2024Ravie LakshmananCyber Assault / Malware

Hackers Use Microsoft MSC Recordsdata to Deploy Obfuscated Backdoor in Pakistan Assaults

A brand new phishing marketing campaign has been noticed using tax-themed lures to ship a stealthy backdoor payload as a part of assaults concentrating on Pakistan.

Cybersecurity firm Securonix, which is monitoring the exercise below the title FLUX#CONSOLE, stated it possible begins with a phishing e-mail hyperlink or attachment, though it stated it could not acquire the unique e-mail used to launch the assault.

“One of many extra notable elements of the marketing campaign is how the menace actors leverage MSC (Microsoft Widespread Console Doc) information to deploy a dual-purpose loader and dropper to ship additional malicious payloads,” safety researchers Den Iuzvyk and Tim Peck said.

It is value noting that the abuse of specifically crafted administration saved console (MSC) information to execute malicious code has been codenamed GrimResource by Elastic Safety Labs.

The place to begin is a file with double extensions (.pdf.msc) that masquerades as a PDF file (if the setting to show file extensions is disabled) and is designed to execute an embedded JavaScript code when launched utilizing the Microsoft Administration Console (MMC).

Cybersecurity

This code, in flip, is answerable for retrieving and displaying a decoy file, whereas additionally covertly loading a DLL file (“DismCore.dll”) within the background. One such doc used within the marketing campaign is called “Tax Reductions, Rebates and Credit 2024,” which is a reputable doc related to Pakistan’s Federal Board of Income (FBR).

“Along with delivering the payload from an embedded and obfuscated string, the .MSC file is ready to execute further code by reaching out to a distant HTML file which additionally accomplishes the identical aim,” the researchers stated, including that persistence is established utilizing scheduled duties.

The primary payload is a backdoor able to organising contact with a distant server and executing instructions despatched by it to exfiltrate information from compromised programs. Securonix stated the assault was disrupted 24 hours after preliminary an infection.

“From the extremely obfuscated JavaScript used within the preliminary levels to the deeply hid malware code throughout the DLL, the complete assault chain exemplifies the complexities of detecting and analyzing modern malicious code,” the researchers stated.

“One other notable side of this marketing campaign is the exploitation of MSC information as a possible evolution of the traditional LNK file which has been well-liked with menace actors over the previous few years. Like LNK information, additionally they enable for the execution of malicious code whereas mixing into reputable Home windows administrative workflows.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.