Zscaler ThreatLabz attributes a spear-phishing campaign targeting a Colombian government agency to the BlindEagle actor, which used a compromised internal email account, an SVG-smuggled fake judicial portal, nested JavaScript and PowerShell, steganography, the Caminho downloader, and DCRAT as the final RAT. The attack chain involved in-memory execution, Discord-hosted artifacts, process hollowing, and an AES-encrypted DCRAT configuration tied to a certificate-based C2 authentication. #BlindEagle #DCRAT
Keypoints
- BlindEagle targeted a Colombian government agency (MCIT) using a phishing email likely sent from a compromised internal account to increase trust and bypass tenant email checks.
- The phishing lure used a clickable SVG that decoded an embedded Base64 HTML page mimicking a judicial web portal and automatically delivered a malicious JavaScript file.
- A multi-stage file-less chain of nested JavaScript snippets and a PowerShell command retrieved a Base64 payload from the Internet Archive and loaded a .NET assembly in memory.
- The .NET assembly was identified as the Caminho downloader, which fetched an encoded text payload from a Discord CDN URL, decoded it in memory, and executed DCRAT via process hollowing of MSBuild.exe.
- DCRAT was deployed with an AES-256âencrypted configuration and a certificate used for integrity and C2 authentication; Zscaler identified multiple hosts exposing the same certificate issuer.
- Attribution to BlindEagle is based on infrastructure choices (GleSYS ASN, ydns.eu), victimology (Colombia), phishing themes, tooling (Caminho, .NET RATs), and Portuguese artifacts in Caminhoâs code.
MITRE Techniques
- [T1583.001 ] Acquire Infrastructure: Domains â BlindEagle used the YDNS.eu D-DNS service for the C2 domain ( âBlindEagle used the YDNS.eu D-DNS service for the C2 domain.â)
- [T1586.002 ] Compromise Accounts: Email Accounts â The phishing message was likely sent from a compromised account within the targeted organization ( âattacker controlled the senderâs email account and used it to deliver a phishing attemptâ).
- [T1588.001 ] Obtain Capabilities: Malware â BlindEagle employed Caminho as a downloader and DCRAT as the final RAT ( âBlindEagle employed Caminho, a downloaderâŚand the open-source RAT known as DCRAT.â)
- [T1608.001 ] Stage Capabilities: Upload Malware â An obfuscated instance of DCRAT was staged on Discord for retrieval ( âstaged an obfuscated instance of DCRAT on Discord.â)
- [T1566.001 ] Phishing: Spearphishing Attachment â Initial access was attempted via a phishing email containing a clickable SVG image ( âphishing email bearing a clickable SVG image.â)
- [T1059.001 ] Command and Scripting Interpreter: PowerShell â PowerShell was used to download an image from the Internet Archive and carve out a Base64 payload that is loaded as a .NET assembly ( âdownload an image file from the Internet ArchiveâŚcarves out a Base64-encoded payloadâ).
- [T1059.007 ] Command and Scripting Interpreter: JavaScript â Nested JavaScript snippets performed deobfuscation and launched subsequent stages leading to PowerShell execution ( âa file-less attack chain composed of three JavaScript code snippets followed by a PowerShell commandâ).
- [T1204.001 ] User Execution: Malicious Link â The attack required the user to click the SVG image to open the fake portal ( âThe image above is fully clickableâ).
- [T1204.002 ] User Execution: Malicious File â The chain required the user to open a downloaded JavaScript file to progress to later stages ( âafter the user double-clicks on the fraudulent receipt downloadedâŚa file-less attack chainâ).
- [T1047 ] Windows Management Instrumentation â The final JavaScript used WMI Win32_Process Create() to execute a PowerShell command ( âit leverages Windows Management Instrumentation (WMI) to obtain a Win32_Process instanceâ).
- [T1547.001 ] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder â DCRAT can set persistence via RunKey when executed by an unprivileged user ( âDCRAT is capable of setting persistence via RunKeyâ).
- [T1053.005 ] Scheduled Task/Job: Scheduled Task â DCRAT can set persistence using scheduled tasks ( âDCRAT is capable of setting persistence via scheduled tasksâ).
- [T1140 ] Deobfuscate/Decode Files or Information â Multiple stages used Base64-encoded payloads that were decoded during execution ( âMultiple stages in the attack chain are composed of Base64-encoded payloads.â)
- [T1562.001 ] Impair Defenses: Disable or Modify Tools â DCRAT includes an AMSI bypass to evade detection ( âDCRAT ships with an AMSI bypass techniqueâ).
- [T1027.003 ] Obfuscated Files or Information: Steganography â Caminho was hidden in encoded form within a PNG image ( âCaminho is hidden in encoded form within a PNG image.â)
- [T1027.010 ] Obfuscated Files or Information: Command Obfuscation â JavaScript and PowerShell snippets were obfuscated or Base64-encoded at several stages ( âobfuscates JavaScript and PowerShell code snippets either by encoding them in Base64 or using other custom obfuscation methods.â)
- [T1027.017 ] Obfuscated Files or Information: SVG Smuggling â A fraudulent web portal was embedded inside an SVG image ( âhid a fraudulent web portal inside an SVG image using obfuscation.â)
- [T1027.013 ] Obfuscated Files or Information: Encrypted/Encoded File â Caminho was stored as a text file encoded in reverse Base64 ( âCaminho was stored as a text file encoded in reverse Base64.â)
- [T1055.012 ] Process Injection: Process Hollowing â Caminho executes DCRAT by hollowing an MSBuild.exe process ( âhollowing a MsBuild.exe processâ).
- [T1497.001 ] Virtualization/Sandbox Evasion: System Checks â DCRAT attempts to detect sandbox environments by checking WMI system cache memory descriptions ( âDCRAT attempts to detect sandbox environments by examining the WMI system cache memory descriptions.â)
- [T1095 ] Non-Application Layer Protocol â DCRAT uses socket-based channels for C2 communications ( âDCRAT communications to and from the C2 server happen via socket-based channels.â)
- [T1105 ] Ingress Tool Transfer â DCRAT supports installing and executing additional plugins (DLLs) delivered by the operator ( âDCRAT supports the installation and execution of additional plugins in the form of DLLs.â)
Indicators of Compromise
- [File Hashes ] hashes for artifacts used in the campaign â MD5 961ebce4327b18b39630bfc4edb7ca34 (JavaScript file), SHA256 e7666af17732e9a3954f6308bc52866b937ac67099faa212518d5592baca5d44 (DCRAT instance), and 19 more hashes.
- [IP Addresses ] hosts exposing the X.509 certificate tied to the DCRAT configuration â 45.74.34.32, 103.20.102.130, and other listed hosts.
- [Domains ] command-and-control and hosting domains â startmenuexperiencehost[.]ydns.eu (DCRAT C2 domain), cdn.discordapp[.]com (Discord CDN used to host AGT27.txt), and other infrastructure.
- [File Names ] notable filenames observed in the attack chain â ESCRITO JUDICIAL AGRADECEMOS CONFIRMAR RECIBIDO NOTIFICACION DE ADMISION DEMANDA LABORAL ORDINARIA E S D.js (malicious JavaScript), AGT27.txt (Caminho payload hosted on Discord).
- [URLs ] download locations and image hosting used to hide payloads â hXXps://archive[.]org/download/optimized_msi_20250821/optimized_MSI.png (PNG carrying encoded Caminho), and the Discord CDN URL for AGT27.txt (obfuscated in the sample).