Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章的英文内容,看起来是关于一个复杂的恶意软件活动的。 首先,我得通读整篇文章,抓住主要信息。文章提到了多阶段的恶意软件活动,使用批处理脚本作为入口,传递加密的远程访问木马(RAT)有效载荷,包括XWorm、AsyncRAT和Xeno RAT。攻击链被命名为VOID#GEIST。 攻击过程分为几个阶段:首先通过钓鱼邮件分发批处理脚本,启动后显示一个诱骗PDF,同时执行隐藏的PowerShell命令。然后在启动文件夹中放置辅助脚本以确保持久性。接着从TryCloudflare域获取ZIP档案,包含Python加载器和加密的有效载荷。使用合法的Python运行时解密并注入有效载荷到内存中,最后连接到C2服务器确认入侵。 用户要求总结控制在100字以内,并且不需要特定开头。我需要提取关键点:多阶段恶意软件、批处理脚本、加密RAT、VOID#GEIST、钓鱼邮件、诱骗PDF、内存注入、持久性机制、合法Python运行时、C2连接。 现在把这些信息浓缩成简洁的句子,确保不超过100字。可能的结构是先介绍攻击活动和名称,然后描述传播方式和机制,最后提到目标和检测难度。 检查一下字数是否合适,并确保没有遗漏关键点。最终总结应该清晰明了,涵盖主要攻击手法和机制。 </think> 研究人员披露了一种名为VOID#GEIST的多阶段恶意软件活动,利用批处理脚本分发加密远程访问木马(RAT),如XWorm、AsyncRAT和Xeno RAT。攻击通过钓鱼邮件传播,初始阶段显示诱骗PDF并隐藏执行过程。后续阶段使用合法Python运行时解密并注入内存中的shellcode模块。该活动采用无文件执行机制和用户级持久性策略以规避检测,并最终连接至C2服务器确认入侵。 2026-3-6 14:33:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT.

The stealthy attack chain has been codenamed VOID#GEIST by Securonix Threat Research.

At a high level, the obfuscated batch script is used to deploy a second batch script, stage a legitimate embedded Python runtime, and decrypt encrypted shellcode blobs, which are executed directly in memory by injecting them into separate instances of "explorer.exe" using a technique called Early Bird Asynchronous Procedure Call (APC) injection.

"Modern malware campaigns increasingly shift from standalone executables toward complex, script-based delivery frameworks that closely mimic legitimate user activity," researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee said in a technical report shared with The Hacker News.

"Rather than deploying traditional PE binaries, attackers leverage modular pipelines comprising batch scripts for orchestration, PowerShell for stealthy staging, legitimate embedded runtimes for portability, and raw shellcode executed directly in memory for persistence and control."

This fileless execution mechanism minimizes disk-based detection opportunities, thereby allowing the threat actors to operate within compromised systems without triggering security alerts. What's more, the approach offers an extra advantage in that these individual stages appear harmless in isolation and resemble regular administrative activity.

The starting point of the attack is a batch script that's fetched from a TryCloudflare domain and distributed via phishing emails. Once launched, it deliberately avoids taking steps to escalate privileges and leverages the permission rights of the currently logged-in user to establish an initial foothold, while blending into seemingly innocuous administrative operations.

The initial stage serves as a launchpad to display a decoy PDF by launching Google Chrome in full-screen. The displayed financial document or invoice serves as a visual distraction to conceal what's happening behind the scenes. This includes launching a PowerShell command to re-execute the original batch script, such as using the -WindowStyle Hidden parameter, to avoid displaying a console window.

To ensure persistence across system reboots, an auxiliary batch script is placed in the Windows user's Startup directory so that it's automatically executed every time the victim logs in to the system. The absence of more intrusive persistence methods is intentional, as it reduces the forensic footprint.

"Technically, this persistence method operates entirely within the current user's privilege context. It does not modify system-wide registry keys, create scheduled tasks, or install services," the researchers said. "Instead, it relies on standard user-level startup behavior, which requires no elevation and generates minimal security friction. This design choice reduces the likelihood of triggering privilege escalation prompts or registry-monitoring alerts."

The next phase begins with the malware reaching out to a TryCloudflare domain to fetch additional payloads in the form of ZIP archives that contain multiple files -

  • runn.py, a Python-based loader script responsible for decrypting and injecting encrypted shellcode payload modules into memory
  • new.bin, an encrypted shellcode payload corresponding to XWorm
  • xn.bin, an encrypted shellcode payload corresponding to Xeno RAT
  • pul.bin, an encrypted shellcode payload corresponding to AsyncRAT 
  • a.json, n.json, and p.json, key files containing the decryption keys required by the Python loader to dynamically decrypt the shellcode at runtime

Once the files are extracted, the attack sequence deploys a legitimate embedded Python runtime directly from python[.]org. This step offers several advantages. For starters, it eliminates any dependency on the system. As a result, the malware can continue to operate even if the infected endpoint does have Python installed.

"From the attacker's perspective, the objectives of this stage are portability, reliability, and stealth," Securonix said. "By embedding a legitimate interpreter into the staging directory, the malware transforms itself into a fully self-contained execution environment capable of decrypting and injecting payload modules without relying on external system components."

The main goal of the attack is to leverage the Python runtime to launch "runn.py," which then decrypts and runs the XWorm payload using Early Bird APC injection. The malware also makes use of a legitimate Microsoft binary, "AppInstallerPythonRedirector.exe," to invoke Python and launch Xeno RAT. In the last stage, the Python loader uses the same injection mechanism to launch AsyncRAT.

The infection chain culminates with the malware transmitting a minimal HTTP beacon back to attacker-controlled C2 infrastructure hosted on TryCloudflare to confirm the digital break-in. It's currently not known who the targets of the attack were, and if there have been any successful compromises.

"This repeated injection pattern reinforces the modular architecture of the framework. Instead of delivering a single monolithic payload, the attacker deploys components incrementally, improving flexibility and resilience," Securonix said. "From a detection standpoint, repeated process injection into explorer.exe within short time windows is a strong behavioral indicator that correlates across stages of the attack."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
如有侵权请联系:admin#unsafe.sh