New I2PRAT communicates via anonymous peer-to-peer network
Dec. 16, 2024, 12:33 p.m.
Tags
External References
Description
A novel malware strain, I2PRAT, has been discovered utilizing the I2P network for command and control communication. The infection begins with a phishing email leading to a fake CAPTCHA page, which tricks users into executing a malicious PowerShell script. The malware employs UAC bypass, Microsoft Defender evasion techniques, and WFP filters to render the victim's machine vulnerable. The RAT's modular structure includes various plugins for different functionalities, such as downloading files, enabling RDP, managing user accounts, and creating scheduled tasks. The malware has been active since at least March 2024 and may be distributed through PrivateLoader.
Date
Published: Dec. 16, 2024, 10:31 a.m.
Created: Dec. 16, 2024, 10:31 a.m.
Modified: Dec. 16, 2024, 12:33 p.m.
Attack Patterns
I2PRAT
PrivateLoader
T1562.004
T1021.001
T1548.002
T1543.003
T1053.005
T1555.003
T1136
T1566.002
T1547.001
T1095
T1562.001
T1055