2025-08-15 (Friday): Here are some images from a post I wrote for my employer on other social media platforms.

This is from a #LummaStealer infection that led to #SectopRAT (#ArechClient2).

A #pcap of the infection traffc, along with the associated #malware and artifacts are available at https://www.malware-traffic-analysis.net/2025/08/15/index.html

We've observed an interesting infection chain ⛓️ in the wild, starting with #LummaStealer spread through a fake gaming website and resulting in #Latrodectus and #SectopRat πŸͺ²πŸ”πŸ‘€

See below for more ⬇️

2025-07-15 (Tuesday): #LummaStealer infection with #SecTopRAT.

A #pcap of the #Lumma traffic and #SecTop #RAT activity, the #malware/artifacts from an infection, and the associated IOCs are available at https://www.malware-traffic-analysis.net/2025/07/15/index.html

Fake Zoom Ends in BlackSuit Ransomware

Key Takeaways The threat actor gained initial access by a fake Zoom installer that used d3f@ckloader and IDAT loader to drop SectopRAT. After nine days of dwell time, the SectopRAT malware dropped …

The DFIR Report

Enterprise networks were targeted in a campaign that involved SectopRAT and the deployment of BlackSuit ransomware via a trojanized Zoom installer.

πŸ”—Read more: https://www.technadu.com/fake-zoom-installer-deploys-blacksuit-ransomware-in-enterprise-targeted-attack/582839/

#Ransomware #BlackSuit #SectopRAT #Zoom #Malware

Fake Zoom Installer Deploys BlackSuit Ransomware in Enterprise-Targeted Attack

Enterprise networks were targeted in a campaign that involved SectopRAT and the deployment of BlackSuit ransomware via a trojanized Zoom installer.

TechNadu
I Am Not A Robot

Since our last report, threat groups have refined ClickFix social engineering tactics. We analyse a new variant that presents as a Cloudflare turnstile challenge.

Been awhile since the last #ArechClient2 / #SectopRAT #malware #infrastructure update. Let's take a look:

A new cluster has formed in Germany using HETZNER-AS (24940):
/167.235.102.163
/144.76.163.55 on port 15648 instead of 15647 for comms
/144.76.163.20 as above

Back in early May a new IP, this time in North Holland was observed: /185.73.125.96 - XHOST-INTERNET-SOLUTIONS (208091). It remains active.

A number of new Russian IPs have been added with Prospero:
/91.215.85.23
/91.215.85.26

And Medialand:
/45.141.87.16
/45.141.87.218

A number of IPs previously tracked have either gone offline completely or have stopped serving the "EncryptionStatus" banner:

/194.26.135.180
/152.89.217.229
/176.111.174.142
/2.57.149.77
/185.161.248.159

Stories from the SOC Part 2: MSIX Installer Utilizes Telegram Bot to Execute IDAT Loader | Rapid7 Blog

In part one of our blog series, we discussed how a Rust based application was used to download and execute the IDAT Loader. In part two of this series, we will be providing analysis of how an MSIX installer led to the download and execution of the IDAT Loader.

Rapid7
Bing ad for NordVPN leads to SecTopRAT | Malwarebytes

Threat actors are luring victims to a fake NordVPN website that installs a Remote Access Trojan.

Malwarebytes
SectopRAT Loader - Updates :: Reverse Engineering and Analysis β€” Reverse Engineering and Analysis

This will be a relatively short writeup, detailing some interesting new wrinkles I uncovered regarding a SectopRAT loader. I was collecting screenshots for my last blog post when I noticed an open directory on pputty[.]us, the site to which a malicious Google ad pointed.