
Since the attacker can maluse the information to perform the second attack, users must make sure not to open spam mails with unknown source.Īlso, users must conduct security update of MS Office products to the latest version to ensure that their PC is not exposed to vulnerability.

When information stealer malware is run in PC, user’s account information such as FTP, web browser, and outlook password can be leaked. Once Crypter type malware is executed, it decrypts the encrypted PE inside the file and injects it into other process by using technique like ProcessHollowing. lala 3 LICENSE README.md 3 README.md Crypter-Autoit Crypter Autoit of M3. NET and save the malware as encrypted in order to complicate AV signature detection against well-known malware like Nanocore. GitHub - Axe-Usa/Crypter-Autoit: Crypter Autoit master 1 branch 0 tags Go to file Code Axe-Usa Create README.md 768b54d on 7 commits Failed to load latest commit information. Expert in Antivirus Evasion, Crypters and. Operators use language such as VB 6.0, Delphi, AutoIt. Tool development: shell scripting/python/Perl, Autoit, C Malware Analysis Reversing: IDA, radare, OllyDbg. RTF file that contains unrecognizable text.Īccording to the analysis, ASEC confirmed that most of malware ultimately downloaded to the system via RTF document were prevalent malware including HawkEye, Nanocore, FormBook, Lokibot, Remcos.

When a user runs vulnerable RTF document file, the content may be normal like seen on Figure 3., but it also may print content in unidentifiable strings as seen on Figure 4. When opening an attachment file, users should suspect it as a document with RTF vulnerability it the file content is not related to the email or filled with unrecognizable strings.įigure 4. The following are the key attack vectors of RTF document vulnerability that attackers exploit: OLE2Link vulnerabilityĪlong with RTF format vulnerability, attackers also run shellcode that downloads additional malware aby inserting equation editor vulnerability of MS Office into RTF internal stream object. These options are going to make your exe remain FUD for longer period of time.Inbuilt binder is also provided to help you bind two exe files together. Builder Autoit Working ON all Windows platforms 32 & 64 bit. The good news is that it got AutoIT stub as well as C stub. RTF is a document format developed by Microsoft, highly compatible and can even be opened on Hangul word processor in some instances. RazorCrypt is Fully Undetectable(FUD), scantime and runtime crypter with some awesome features.It has simple and easily to use interface. Most of the malicious document files that do not require user action but just execution to download additional malware usually exploit Rich Text Format(RTF) document vulnerability.

Hence, the best way to remain secure is not opening the document file at all. The problem is that non-macro document files that exploit vulnerability are capable of downloading and running malware without user action. In this case, the additional malware will not be downloaded unless user press “Enable Content” button. Document file that requires user actionĭocuments like the one shown on Figure 2 include messages such as “Enable Editing” and “Enable Content” to activate macro feature that downloads additional malware.
