Researchers Uncovers New Nerbian RAT Malware

Share post:

Researchers at Proofpoint have released a new report which contains details on the new Nerbian RAT malware.

Nerbian RAT is a new malware written in Go which makes it a cross-platform 64-bit threat. It is distributed through a small-scale email distribution campaign that uses document attachments laced with marcos.

The email campaign impersonates the World Health Organization (WHO) by allegedly sending COVID-19 information to the targets.

The RAR attachments contain Word documents that contain malicious macro code. Once it is opened on Microsoft Office with content set to “enabled,” a bat file performs a PowerShell execution step to download a 64-bit dropper.

The dropper named “UpdateUAV.exe,” is written in Golang and is vital in helping the malware bypass the detection-evasion mechanism before it is deployed.

Some anti-analysis tool the malware use to protect itself from being analyzed include checking for the existence of reverse engineering or debugging programs in the process list, checking for suspicious MAC addresses, and checking the WMI strings to see if disk names are legitimate.

Others include checking if the hard disk size is below 100GB, checking if there is any memory analysis, checking the amount of time elapsed since execution, and using the IsDebuggerPresent API to determine if the executable is being debugged.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways