![](https://static.wixstatic.com/media/424b39_3d73cf1d0647417a977d048a6e43ec35~mv2.jpg/v1/fill/w_728,h_380,al_c,q_80,enc_auto/424b39_3d73cf1d0647417a977d048a6e43ec35~mv2.jpg)
The world of cybersecurity continues to grapple with ever-evolving threats. The latest to hit the radar is a deceptive software installation technique adopted by threat actors to spread the notorious Remcos RAT. This malicious malware delivery method disguises the Fruity trojan inside a regular software installer, tricking users into unknowingly inviting the threat onto their systems. But what is the extent of this deception? Let's take a closer look.
The Deception Tactics
Adopting a wolf-in-sheep's-clothing strategy, threat actors are creating faux websites hosting trojanized software installers, thus deceiving users into downloading a nefarious downloader malware called Fruity, with the ultimate aim of installing remote trojans like Remcos RAT.
Cybersecurity experts at Doctor Web revealed that the target software ranges from CPU, graphic card, and BIOS tuning tools to PC hardware-monitoring utilities and other apps. By bundling the trojan with these applications, the attackers ensure its delivery to the victims' systems.
How users are initially exposed to these fake websites remains vague, but the speculated vectors include phishing, drive-by downloads, and malicious ads.
The Invisible Invasion
The invasion starts when users are enticed to download a ZIP installer package. However, this is no ordinary installer. While activating the standard installation process, it covertly deploys the Fruity trojan, a Python-based malware that uses steganography to conceal the attack.
Fruity trojan unpacks an MP3 file ("Idea.mp3") to load an image file ("Fruit.png") that activates the multi-stage infection. This image file cunningly hides two executables (.dll libraries) and the shellcode for the next-stage initialization.
Fruity is also equipped to evade antivirus detection on the compromised host and ultimately launch the Remcos RAT payload using process doppelgänging, a sophisticated evasion technique.
![](https://static.wixstatic.com/media/424b39_6b6bfa1660904449829bc6a29aae9090~mv2.jpg/v1/fill/w_728,h_698,al_c,q_85,enc_auto/424b39_6b6bfa1660904449829bc6a29aae9090~mv2.jpg)
The Risks and Remediation
The technique is not limited to the distribution of Remcos RAT, but it can also be exploited to distribute all sorts of malware. This revelation underlines the importance of downloading software only from trustworthy sources.
Keywords and Explanations
Trojanized Software Installers: Software installers modified by attackers to include harmful code.
Fruity Trojan: A Python-based malware that hides in software installers.
Remcos RAT: A Remote Access Trojan that can control a victim's machine remotely.
Steganography: The practice of concealing files, messages, or images within another file, message, or image.
Process Doppelgänging: A fileless code injection technique that evades security software detection.
CSOC: Cybersecurity Operations Center, responsible for cybersecurity management and response.
In a Nutshell
Threat actors are deploying the Fruity trojan via software installers to spread Remcos RAT. This deceptive strategy underlines the importance of downloading software from trusted sources and highlights the need for strong cybersecurity measures, especially in a CSOC environment.
Comments