A new campaign that delivers Astaroth malware through fileless execution has been spotted by Microsoft’s Defender ATP team. It was found that the campaign ran Astaroth directly in memory. The attackers relied on spear-phishing in order to spread this information-stealing malware. Furthermore, they leveraged the Windows Management Instrumentation Command-line (WMIC) tool to run scripts for fileless execution.
The big picture
Worth noting
Lelli believes that the attackers might deploy other techniques on top of using a living-off-the-land technique for spreading Astaroth.
“The attack chain above shows only the Initial Access and Execution stages. In these stages, the attackers used fileless techniques to attempt to silently install the malware on target devices. Astaroth is a notorious information stealer with many other post-breach capabilities that are not discussed in this blog. Preventing the attack in these stages is critical,” Lelli wrote in the blog.
Publisher