New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data
The Acronis Threat Research Unit has identified new variants of Chaos RAT, a remote administration tool (RAT) that has evolved from an open-source project first observed in 2022 into a formidable multi-platform malware.
These latest iterations of Chaos RAT are now targeting both Windows and Linux systems, showcasing an alarming level of sophistication through phishing-driven infection chains and advanced evasion techniques.
A Sophisticated Evolution of an Open-Source Threat
Written primarily in C++, this malware is being leveraged by threat actors to deploy cryptominers, steal sensitive data, and establish persistent control over compromised devices, posing a severe risk to organizations and individuals across diverse industries.
Chaos RAT spreads predominantly through phishing campaigns, utilizing malicious PDF attachments embedded in emails to lure unsuspecting users into initiating the infection process.
On Windows systems, clicking embedded links in these PDFs triggers the download of a JavaScript file, which subsequently retrieves a ZIP archive containing a BAT script.
This script executes a sequence of commands to download and deploy the final Chaos RAT payload, ensuring persistence through scheduled tasks and registry modifications.
Multi-Stage Infection
On Linux platforms, the malware disguises itself as a legitimate network diagnostic tool, often named “NetworkCheck,” using shell scripts to fetch and execute the RAT from obfuscated URLs with encrypted payloads, evading traditional security controls.
The technical prowess of Chaos RAT is further highlighted by its multi-stage delivery mechanism and robust anti-analysis techniques, including encoded strings, dynamic API resolution, and checks for virtualized environments or sandboxes to prevent detection and reverse engineering.
Once deployed, Chaos RAT grants attackers extensive control over infected systems, enabling capabilities such as keylogging, screen capture, file exfiltration, and remote command execution.
Additionally, it installs cryptocurrency mining modules that exploit system resources for illicit profit, severely impacting device performance.
The dual-platform targeting broadens its attack surface, making it a versatile threat capable of affecting a wide range of environments.
According to PolySwarm analysts Report, the open-source nature of Chaos RAT has fueled rapid iterations by threat actors, who continue to enhance its feature set and evasion tactics, positioning it as an evolving and persistent danger in the cybersecurity landscape.
While specific targeted regions or industries remain undisclosed, the malware’s adaptability underscores the urgent need for robust defense mechanisms and heightened user awareness to mitigate its impact.
Indicators of Compromise (IOCs)
Below is a table of known IOCs associated with Chaos RAT samples provided by PolySwarm for reference in threat detection and mitigation efforts:
SHA256 Hash |
---|
1e074d9dca6ef0edd24afb2d13ca4429def5fc5486cd4170c989ef60efd0bbb0 |
77962a384d251f0aa8e3008a88f206d6cb1f7401c759c4614e3bfe865e3e985c |
44c54d9d0b8d4862ad7424c677a6645edb711a6d0f36d6e87d7bae7a2cb14d68 |
c9694483c9fc15b2649359dfbd8322f0f6dd7a0a7da75499e03dbc4de2b23cad |
080f56cea7acfd9c20fc931e53ea1225eb6b00cf2f05a76943e6cf0770504c64 |
a583bdf46f901364ed8e60f6aadd2b31be12a27ffccecc962872bc73a9ffd46c |
a364ec51aa9314f831bc498ddaf82738766ca83b51401f77dbd857ba4e32a53b |
a6307aad70195369e7ca5575f1ab81c2fd82de2fe561179e38933f9da28c4850 |
c39184aeb42616d7bf6daaddb9792549eb354076b4559e5d85392ade2e41763e |
719082b1e5c0d18cc0283e537215b53a864857ac936a0c7d3ddbaf7c7944cf79 |
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates
Source link