{"id":2762,"date":"2025-04-15T22:49:20","date_gmt":"2025-04-15T22:49:20","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2762"},"modified":"2025-04-15T22:49:20","modified_gmt":"2025-04-15T22:49:20","slug":"new-resolverrat-malware-targets-healthcare-and-pharma-orgs-worldwide","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2762","title":{"rendered":"New ResolverRAT malware targets healthcare and pharma orgs worldwide"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Security researchers have observed a new malware payload deployed in attacks against the healthcare and pharmaceutical sectors. Dubbed ResolverRAT, the <a href=\"https:\/\/www.csoonline.com\/article\/570049\/from-pranks-to-apts-how-remote-access-trojans-became-a-major-security-threat.html\">remote access Trojan<\/a> features in-memory execution and sophisticated anti-analysis and payload encryption techniques.<\/p>\n<p>ResolverRAT has been distributed through phishing emails with malicious attachments that use fear-based lures mentioning copyright infringement, various legal violations, and ongoing investigations. The emails are localized in multiple languages, including English, Hindi, Italian, Indonesian, Turkish, Portuguese, and Czech, indicating the global scale of the campaign.<\/p>\n<p>\u201cWhile recent reports by Check Point and Cisco Talos have attributed similar phishing infrastructure and delivery mechanisms to campaigns distributing Rhadamanthys and Lumma respectively, the RAT observed in Morphisec Threat Labs\u2019 incident investigations appears to be previously undocumented,\u201d Morphisec researchers <a href=\"https:\/\/www.morphisec.com\/blog\/new-malware-variant-identified-resolverrat-enters-the-maze\/\">wrote in their report<\/a> released Monday. \u201cDespite clear overlaps in payload delivery, email lure themes, and even binary reuse, this variant introduces a distinct loader and payload architecture that warranted classification as a new malware family.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Memory-only execution<\/h2>\n<p>The phishing emails have ZIP attachments that contain a legitimate binary file called hpreader.exe that\u2019s part of an application called Haihaisoft PDF Reader. This executable file is vulnerable to DLL side-loading, meaning that it tries to load a DLL with a specific name from the same running directory.<\/p>\n<p>Attackers exploit DLL side-loading issues to load malicious code in memory through a legitimate file that\u2019s unlikely to be flagged by security software as malware. In this case, the attackers placed a malicious DLL file in the same directory that would then be automatically loaded and executed by hpreader.exe.<\/p>\n<p>On execution, this first-stage malicious code acts as a loader, decrypting and executing the next payload, which is encrypted with AES-256 encryption. Its keys are stored as obfuscated integers that are decoded when the code is run.<\/p>\n<p>ResolverRAT is written in .NET and uses a technique called .NET resource resolver hijacking that leverages a .NET mechanism to run only within RAM memory and never create resources on disk. This technique aims to evade detection techniques that monitor file and Win32 API operations.<\/p>\n<p>\u201cBy registering a custom handler for ResourceResolve events, the malware can intercept legitimate resource requests and return malicious assemblies instead,\u201d the researchers explained. \u201cThis elegant technique achieves code injection without modifying the PE header or employing suspicious API calls that might trigger security solutions.\u201d<\/p>\n<p>Another technique employed by the malware is called control flow flattening and is meant to make static code analysis much harder, implementing a complicated state machine with hundreds of states and transitions.<\/p>\n<p>Examples of the anti-analysis tactics include non-sequential state transitions to confuse control flow analysis, conditional jumps based on environment checks, dead code and redundant operations to mislead disassemblers, and arithmetic operations to dynamically compute decryption keys.<\/p>\n<h2 class=\"wp-block-heading\">Persistence and stealthy C2 communication<\/h2>\n<p>The new RAT employs multiple persistence strategies, including more than 20 obfuscated registry entries and files dropped in multiple folders on disk. The malware keeps a record of which persistence techniques were successful to use them as a fallback mechanism.<\/p>\n<p>Communication with the command-and-control (C2) server uses TLS encryption with a custom server certificate validation method that compares the certificate served by the server with one stored internally by the malware program. Multiple IP addresses and port numbers are hardcoded to serve as a fallback if the primary server becomes unresponsive.<\/p>\n<p>Connection with the C2 server happens at random intervals to prevent creating a beaconing pattern that network monitoring tools often detect. The communication protocol also uses data serialization to make traffic inspection more challenging. Infected systems are tracked and organized by campaigns and each victim has a unique authentication token generated by the system.<\/p>\n<p>\u201cThe alignment in payload delivery mechanisms, artifact reuse, and lure themes indicates a possible overlap in threat actor infrastructure or operational playbooks, potentially pointing to a shared affiliate model or coordinated activity among related threat groups,\u201d the Morphisec researchers said.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Security researchers have observed a new malware payload deployed in attacks against the healthcare and pharmaceutical sectors. Dubbed ResolverRAT, the remote access Trojan features in-memory execution and sophisticated anti-analysis and payload encryption techniques. ResolverRAT has been distributed through phishing emails with malicious attachments that use fear-based lures mentioning copyright infringement, various legal violations, and ongoing [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2763,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2762"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2762"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2763"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}