The discovered infrastructure comprises domains used for distributing payload and extra IP addresses that are linked to GrayAlpha. Insikt Group found a custom PowerShell loader called PowerNet, which decompresses and launches NetSupport RAT. Insikt Group discovered another custom loader called MaskBat that shares similarities with FakeBat but is hidden and has strings linked to GrayAlpha.
<
p style=”text-align: justify;”>The experts discovered three main primary infection techniques:
- Traffic distribution system (TDS) Tag-124
- Fake 7-Zip download site
- Fake browser update pages
All the infection vectors were used simultaneously, and a detailed analysis by the experts revealed the individual alleged to be a member of GrayAlpha operation.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents