A recent spam campaign unearthed by security researchers was found targeting Colombian entities. It was reported that a new malware known as ‘Proyecto RAT’ was spread in this campaign. In addition, the campaign’s authors relied on a disposable email address service called YOPmail for a command-and-control (C2) server. The campaign was spotted by security researchers from Trend Micro. A group regularly involved in business email compromise (BEC) scam was believed to be behind this campaign.
The big picture
Similarities with Xpert RAT
Trend Micro researchers point out that the new Proyecto RAT was similar to another RAT known as Xpert RAT. “Seeing the many features of the malware, we tried to match it to a known RAT. The communication between client and server is via TCP, is unencrypted, and uses pipe ‘|’ characters and ‘¡@#@!’ as a separator. This description fits quite well with Xpert RAT. Searching for the x86 hex string from cTimer class also leads to links with Xpert RAT,” said the researchers in an analysis of this malware.
Publisher