Saturday, June 14, 2025
Advertisements

Hackers Use Weaponized RAR Archives to Deliver Pure Malware in Russian Cyber Attacks

by Charline

A growing cyberattack campaign is targeting Russian organizations with advanced malware delivered through weaponized RAR archive files. The campaign, which began in March 2023, has intensified sharply in 2025, with a fourfold increase in attacks during the first four months of the year compared to the same period in 2024.

The attacks focus on delivering two main malware tools: the PureRAT backdoor and the PureLogs stealer. These tools give hackers remote access and the ability to steal sensitive data from infected systems.

Advertisements

Attack Method

The main attack method involves spam emails that include either malicious RAR attachments or links to download them. These RAR files use fake accounting-related names like “doc,” “akt,” “sverka,” “buh,” and “oplata.”

Advertisements

Attackers often use double extensions like .pdf.rar to trick users into thinking the file is safe. The emails are designed to deceive employees in finance departments who commonly handle such documents.

Advertisements

Once opened, the RAR archive contains an executable file disguised as a PDF. Running the file starts a multi-stage infection chain meant to avoid detection while installing the malware.

Advertisements

Malware Details

The attack begins when the executable copies itself to the %AppData% folder as Task.exe. It then creates a startup script named Task.vbs with the following command:

CreateObject("WScript.Shell").Run """C:\Users\\AppData\Roaming\Task.exe"""

Next, the malware extracts and runs StilKrip.exe, while also decrypting another file, Ckcfb.exe. This file is injected into InstallUtil.exe, a legitimate Windows process, to avoid being flagged by antivirus tools.

The core backdoor functions are stored in a file named Spydgozoi.dll, which is also decrypted and executed during this stage.

Command and Control Communication

The malware connects to remote command and control (C2) servers using SSL encryption. Data is sent in protobuf format and compressed with gzip.

Each infected device sends detailed system information, including:

  • Device ID
  • Antivirus software installed
  • Operating system version
  • User and computer name
  • System environment details

This data helps attackers adjust their strategies based on the target’s defenses.

Modular Threat Architecture

PureRAT is designed with a modular structure. This allows it to download new components depending on what the attackers want to achieve.

The malware is sold under a Malware-as-a-Service (MaaS) model. This means that many different threat actors can buy and use it, even without advanced skills. This model is one reason for the rapid increase in attacks.

Security Recommendations

Researchers at Securelist warn that the attackers behind this campaign continue to improve their tools. Organizations are advised to strengthen email security and train staff to spot suspicious attachments and naming tricks.

Keeping software updated and using endpoint protection that can detect and block unknown threats is also critical.

This campaign highlights how cybercriminals are using social engineering and technical sophistication to gain deep access to business networks. Ongoing awareness and layered security are essential to defend against these evolving threats.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com