RevengeRAT is a type of Remote Access Trojan (RAT) designed to grant attackers remote control over compromised devices. It was first identified in 2017 and has been linked to cyber espionage campaigns targeting government organizations, and any targeted individuals across the Middle East and South Asia. Typically distributed through phishing emails containing malicious attachments or links, RevengeRAT infiltrates systems upon interaction, enabling attackers to execute unauthorized commands, monitor activities, and steal sensitive data.
Mainly, it maintains persistence on the infected system by creating a Run key Registry entry and adding a shortcut to the user's Startup folder.
File Details:
Technical Analysis of RevengeRAT:
RevengeRAT commonly infiltrates systems via phishing emails or malicious downloads, exploiting software or operating system vulnerabilities. Upon installation, it connects to a command-and-control server, enabling attackers to remotely manipulate the compromised system, extract sensitive data, or execute malicious actions.
In recent trends, malware authors are increasingly relying on PPAM (PowerPoint Add-In Macros) for initial malware distribution. But why? PPAM files are less commonly blocked by security vendors when compared to other file types like EXE, DLL, or office file formats. Furthermore, PPAM files can be embedded within PowerPoint presentations, making them more likely to evade AV detection. This provides attackers with a stealthy means to spread malware while bypassing security measures.
How does it work?
Following our infection chain, the malware author sends the phishing email to the targeted victims machines. Typically, the email subjects or content press users to download attachments or click on phishing URLs. In this campaign, the malware authors attached the attachment file. Upon downloading and opening the .ppam attachment file, a dialog message box prompts users to enable macros to access the file’s content, limiting navigation to other pages. Malware authors capitalize on this feature by embedding malicious macros for exploitation.
Let’s dissect the .PPAM file structure and it’s components:
.PPAM File Components:
Archived Files:
VBAProject.Bin file:
Once enabled and opened, the .ppam file triggers the activation of macro functions, which then execute PowerShell commands in the background.
Macro Functions:
URLDownloadToFileA, part of the Windows API, used to download files from the internet. Within a PowerPoint (PPT) file, it may be employed via an embedded macro or script to fetch files from URLs referenced within the presentation. This capability enables dynamic content downloads during the PowerPoint's runtime, potentially serving various purposes such as obtaining additional malware payloads or updates.
VBA Macro Code:
Hardcoded Powershell Script:
Obtained Powershell Script:
AV Vendor Sandbox Results:
AV vendor sandboxes analyze suspicious URLs within controlled environments to evaluate their effects on systems and networks. Analyzing sandbox results enables us to know whether the URL is associated with malware, phishing attempts, or other malicious activities. Here the obtained URLs is marked as malware.
MITRE ATT@CK MATRIX:
Indicator of Compromises (IOC):
Happy Hunting !!