ASEC documents renewed campaigns distributing SparkRAT through a VPN installer, aided by GoLang-based droppers and MeshAgent to enable remote control via MeshCentral. The operation mirrors past activity but shifts to GoLang malware while expanding remote-desktop capabilities through MeshCentral. #SparkRAT #MeshAgent
Keypoints
- The VPN vendor’s installer is replaced with malware, leading users to install SparkRAT alongside the VPN client.
- GoLang-based droppers and downloaders are used, replacing prior .NET-packers in the attack chain.
- A GoLang downloader (start.exe) fetches SparkRAT and other payloads from external addresses.
- schtasks.exe is used to create a SYSTEM-level startup task, enabling persistence on logon.
- MeshAgent from MeshCentral is installed to provide remote-control capabilities (RDP/VNC) and broader system management.
- SparkRAT is leveraged to execute PowerShell commands and coordinate with MeshAgent for extended access.
MITRE Techniques
- [T1195] Supply Chain Compromise – The threat actor attacked the VPN company’s website and replaced the installation file with malware, so users install the malware along with the VPN installer. “The threat actor had attacked the VPN company’s website and replaced the installation file with malware.”
- [T1053] Scheduled Task/Job – The disguised installer registers an additional generated “start.exe” on the task scheduler. “schtasks.exe /Create /ru SYSTEM /f /SC ONLOGON /rl highest /tn “system update” /tr [%LOCALAPPDATA%]/start.exe”
- [T1059.001] PowerShell – SparkRAT delivers PowerShell commands as part of its operations. The threat actor uses SparkRAT to execute commands such as PowerShell. “The threat actor utilized SparkRAT to deliver PowerShell commands…”
- [T1105] Ingress Tool Transfer – Downloader/GoLang dropper and the Go-based downloader fetch additional payloads (SparkRAT) from external sources. “start.exe is a downloader… responsible for downloading and executing additional malware from an external source. Like in the previous attack cases, SparkRAT is downloaded from the specified address.”
- [T1027] Obfuscated/Compressed Files and Information – GoLang-based droppers and downloaders are obfuscated GoLang malware. “although they are both obfuscated GoLang malware…”
- [T1021] Remote Services – MeshAgent provides remote-control capabilities via MeshCentral, enabling command execution and file transfer on infected hosts. “MeshAgent connects to a remote control page and registers itself as an agent to be managed.”
- [T1078] Valid Accounts – Access can be gained and maintained after “only a simple email authentication” to use MeshAgent. “There is also the advantage of being able to use MeshAgent after only a simple email authentication.”
- [T1071.001] Web Protocols – C2 communications via a dedicated domain/address for SparkRAT control (C2 URL). “aggbvdfbbafdg.moeuda[.]link:443: SparkRAT”
Indicators of Compromise
- [MD5] Malicious files – 0574f906b97f2e74ae49b6e900b5c60d, 162e17324f63f2e1d2c32f7c842b3917, and 3 more hashes
- [URL] Download endpoints – hxxp://54.180.27[.]29/cc/himart/api/kodbox-main/gr.png, hxxp://54.180.27[.]29/cc/himart/api/kodbox-main/ms-update.exe
- [IP Address] Download/command host – 54.180.27[.]29
- [Domain] C2 domain – aggbvdfbbafdg.moeuda[.]link:443
- [File name] Malicious Installer – VPNSetup.exe (and related names in logs), SparkRAT downloader start.exe, MeshAgent dropper update.exe
Read more: https://asec.ahnlab.com/en/53267/