<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Woody RAT malware &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malware/woody-rat-malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Wed, 01 May 2024 15:51:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Woody RAT malware &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>New Android Malware Mimics Social Media Apps to Steal Sensitive Data</title>
		<link>https://firsthackersnews.com/android-malware/</link>
					<comments>https://firsthackersnews.com/android-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 01 May 2024 15:47:58 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Woody RAT malware]]></category>
		<category><![CDATA[android malware]]></category>
		<category><![CDATA[Rat malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Social Media Apps]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7841</guid>

					<description><![CDATA[<p>A new RAT malware targeting Android devices has been discovered, capable of executing additional commands compared to other</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-malware/">New Android Malware Mimics Social Media Apps to Steal Sensitive Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new RAT malware targeting Android devices has been discovered, capable of executing additional commands compared to other RAT malware. It can also conduct phishing attacks by masquerading as legitimate applications such as Snapchat, Instagram, WhatsApp, Twitter, and Google, to harvest credentials from victims.</p>



<p>Sonicwall&#8217;s deeper investigation revealed multiple HTML files in its assets folder, which replicate login pages of various legitimate applications. These files harvest users&#8217; credentials and transmit them back to the C2 server.</p>



<h2 class="wp-block-heading"><strong>Android Malware Mimics Social Media Apps</strong></h2>



<p>The malware&#8217;s infection chain begins after the malicious application is installed on the victim&#8217;s Android devices. During installation, it requests Accessibility service and Device admin permission to seize control over the installed device and carry out additional malicious actions.</p>



<p>The distribution method of this malware remains unclear, but researchers speculate it will utilize traditional social engineering techniques. Once installed, the malware communicates with the C2 server to receive instructions and commands for specific tasks.</p>



<p>The malware executes the following commands:</p>



<p>The C2 URL is embedded in the resource file.</p>



<p>Upon receiving commands from the C2 server, the malware harvests credentials from browsers and other Android applications by presenting a fake login page using HTML files (phishing).</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="626" height="403" src="https://firsthackersnews.com/wp-content/uploads/2024/05/image.png" alt="" class="wp-image-7842" srcset="https://firsthackersnews.com/wp-content/uploads/2024/05/image-200x129.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/05/image-300x193.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/05/image-400x258.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/05/image-460x295.png 460w, https://firsthackersnews.com/wp-content/uploads/2024/05/image-600x386.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/05/image.png 626w" sizes="(max-width: 626px) 100vw, 626px" /><figcaption class="wp-element-caption">Source : Sonicwall</figcaption></figure>



<p>When victims enter their credentials on these phishing pages, they are collected and shared with the showTt function. </p>



<p>Furthermore, the malware gathers the list of phone numbers stored on the victim&#8217;s device and tries to alter the device&#8217;s wallpaper when certain conditions are met. If the &#8216;str&#8217; parameter matches the decrypted value to 0, 1, or 2, the condition for changing the wallpaper is associated with a particular resource.</p>



<p>The malware retrieves information about installed applications from the victim&#8217;s device. Upon deeper analysis of the code, it was found that the malware utilizes the CameraManager to toggle the flashlight on/off on the victim&#8217;s device. Additionally, it sends a message to a specific number based on inputs received from the C2 server.</p>



<h2 class="wp-block-heading" id="h-indicators-of-compromise"><strong>Indicators Of Compromise</strong></h2>



<ul class="wp-block-list">
<li>0cc5cf33350853cdd219d56902e5b97eb699c975a40d24e0e211a1015948a13d</li>



<li>37074eb92d3cfe4e2c51f1b96a6adf33ed6093e4caa34aa2fa1b9affe288a509</li>



<li>3df7c8074b6b1ab35db387b5cb9ea9c6fc2f23667d1a191787aabfbf2fb23173</li>



<li>6eb33f00d5e626bfd54889558c6d031c6cac8f180d3b0e39fbfa2c501b65f564</li>



<li>9b366eeeffd6c9b726299bc3cf96b2e673572971555719be9b9e4dcaad895162</li>



<li>a28e99cb8e79d4c2d19ccfda338d43f74bd1daa214f5add54c298b2bcfaac9c3</li>



<li>d09f2df6dc6f27a9df6e0e0995b91a5189622b1e53992474b2791bbd679f6987</li>



<li>d8413287ac20dabcf38bc2b5ecd65a37584d8066a364eede77c715ec63b7e0f1</li>



<li>ecf941c1cc85ee576f0d4ef761135d3e924dec67bc3f0051a43015924c53bfbb</li>



<li>f10072b712d1eed0f7e2290b47d39212918f3e1fd4deef00bf42ea3fe9809c41</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-malware/">New Android Malware Mimics Social Media Apps to Steal Sensitive Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/android-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware</title>
		<link>https://firsthackersnews.com/chaos-rat/</link>
					<comments>https://firsthackersnews.com/chaos-rat/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 12 Dec 2022 14:51:31 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Woody RAT malware]]></category>
		<category><![CDATA[bruteforce]]></category>
		<category><![CDATA[chaos]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Go-Based malware]]></category>
		<category><![CDATA[linux users]]></category>
		<category><![CDATA[linuxOS]]></category>
		<category><![CDATA[mining]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[ssh]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=5800</guid>

					<description><![CDATA[<p>A cryptocurrency mining attack targeting the Linux operating system also involved the use of an open source remote</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chaos-rat/">Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A cryptocurrency mining attack targeting the Linux operating system also involved the use of an open source remote access trojan (RAT) dubbed CHAOS.</p>



<p>The potency of the Chaos malware stems from a few factors: first, it is designed to work across several architectures, including: ARM, Intel (i386), MIPS and PowerPC – in addition to both Windows and Linux operating systems. Second, unlike largescale ransomware distribution botnets like Emotet that leverage spam to spread and grow, Chaos propagates through known CVEs and brute forced as well as stolen SSH keys.</p>



<p>The cybersecurity firm said that the main downloader script and further payloads are hosted in multiple locations to make sure that the campaign remains active and new infections continue to happen.</p>



<p>The rat functions as below:</p>



<ul class="wp-block-list"><li>Perform reverse shell</li><li>Download files</li><li>Upload files</li><li>Delete files</li><li>Take screenshots</li><li>Access file explorer</li><li>Gather operating system information</li><li>Restart the PC</li><li>Shutdown the PC</li><li>Open a URL</li></ul>



<p>The CHAOS RAT, once downloaded and launched, transmits detailed system metadata to a remote server, while also coming with capabilities to carry out file operations, take screenshots, shutdown and restart the computer, and open arbitrary URLs.</p>



<p>CHAOS RAT IOCS</p>



<pre class="wp-block-preformatted">HA-256									File name		Detection name

051351f4257d7f87bede9b72455aae5a5b9a8269bfb4bcbecb1501f7a3409957	config.json		PUA.Linux.XMRMiner.AB
759c496b114f9212c610892c5236935cced564a78b3b410bd2d27c9ee6257f42	genshin			Trojan.Linux.CHAOSRAT.USELVHA22													
52ab96b1d99964502a7946eef39a5f636d8a240c747d43f8568d62cf0e960ae9	rn02s62s		Trojan.SH.MALXMR.UWELT
7a96d9f7a25a67ec2873bb814cb0ba104d3b7c1651f65ff09d8e1f76cba6fb79	solr.sh			Trojan.SH.MALXMR.UWELT
fd452da0d978514adaeee1dd5227212aad00bf07f2481d335eed77a4ee08a5e8	xg546sAd		Trojan.SH.MALXMR.UWELT
3928c5874249cc71b2d88e5c0c00989ac394238747bb7638897fc210531b4aab	xmrig_setup.exe		Trojan.JS.MALXMR.CMPAW</pre>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chaos-rat/">Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chaos-rat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Russian organizations attacked with new Woody RAT malware</title>
		<link>https://firsthackersnews.com/woody-rat-malware/</link>
					<comments>https://firsthackersnews.com/woody-rat-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 04 Aug 2022 11:01:36 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Woody RAT malware]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[phishing email]]></category>
		<category><![CDATA[Rat malware]]></category>
		<category><![CDATA[russian org]]></category>
		<category><![CDATA[targetted domains]]></category>
		<category><![CDATA[Woody RAT]]></category>
		<category><![CDATA[zip archive]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=5278</guid>

					<description><![CDATA[<p>On Wednesday, Hackers attacks Russian organizations with the newly discovered malware, allowing them to take control and steal</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/woody-rat-malware/">Russian organizations attacked with new Woody RAT malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>On Wednesday, Hackers attacks Russian organizations with the newly discovered malware, allowing them to take control and steal information from compromised devices remotely.</p>



<p>According to Malwarebytes, one of the Russian organizations which were targeted using this Rat malware is a government-controlled defense corporation.</p>



<h2 class="wp-block-heading"><strong>Woody RAT Malware</strong></h2>



<p>This advanced custom Rat is mainly the work of a threat actor that targets Russian entities by using lures in archive file format and more recently Office documents leveraging the Follina vulnerability.</p>



<p>This malware is currently delivered onto targets&#8217; computers via phishing emails through two distribution methods: </p>



<p>ZIP archive files containing the malicious payload  or microsoft office documents.</p>



<p>Woody Rat can also execute .NET code and PowerShell commands and scripts received from its C2 server using two DLLs named WoodySharpExecutor and WoodyPowerSession.</p>



<p>Once launched on a compromised device, the malware uses <a href="https://attack.mitre.org/techniques/T1055/012/" target="_blank" rel="noreferrer noopener">process hollowing</a> to inject itself into a suspended Notepad process, deletes itself from the disk to evade detection from security products, and resumes the thread.</p>



<p>Malwarebytes is yet to attribute the malware and the attacks to a known threat group but said that a very short list of possible suspects includes Chinese and North Korean APTs.</p>



<h2 class="wp-block-heading">IOCs</h2>



<h2 class="wp-block-heading"><strong>Woody</strong>&nbsp;<strong>Rat</strong>:</h2>



<ul class="wp-block-list"><li>982ec24b5599373b65d7fec3b7b66e6afff4872847791cf3c5688f47bfcb8bf0</li><li>66378c18e9da070629a2dbbf39e5277e539e043b2b912cc3fed0209c48215d0b</li><li>b65bc098b475996eaabbb02bb5fee19a18c6ff2eee0062353aff696356e73b7a</li><li>43b15071268f757027cf27dd94675fdd8e771cdcd77df6d2530cb8e218acc2ce</li><li>408f314b0a76a0d41c99db0cb957d10ea8367700c757b0160ea925d6d7b5dd8e</li><li>0588c52582aad248cf0c43aa44a33980e3485f0621dba30445d8da45bba4f834</li><li>5c5020ee0f7a5b78a6da74a3f58710cba62f727959f8ece795b0f47828e33e80</li><li>3ba32825177d7c2aac957ff1fc5e78b64279aeb748790bc90634e792541de8d3</li><li>9bc071fb6a1d9e72c50aec88b4317c3eb7c0f5ff5906b00aa00d9e720cbc828d</li></ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/woody-rat-malware/">Russian organizations attacked with new Woody RAT malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/woody-rat-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
