๐Ÿšจ ๐—ฆ๐—ฝ๐—ฎ๐—ป๐—ธ: ๐—Ÿ๐—ฒ๐—ด๐—ถ๐˜๐—ถ๐—บ๐—ฎ๐˜๐—ฒ ๐—ฃ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—”๐—ฏ๐˜‚๐˜€๐—ฒ, ๐——๐—ฒ๐—น๐—ฎ๐˜†๐—ฒ๐—ฑ ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป, ๐—ฎ๐—ป๐—ฑ ๐—ฅ๐—”๐—ง ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—ป๐—ฐ๐—ฒ.
We caught a two-component Rust-based RAT toolkit we're calling #SpankRAT. Because C2 traffic originates from legitimate system processes, ๐˜๐—ต๐—ถ๐˜€ ๐—ฎ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—ฐ๐—ฎ๐—ป ๐—ฏ๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐—ฟ๐—ฒ๐—ฝ๐˜‚๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป-๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฐ๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฏ๐—ฒ ๐—ฑ๐—ฒ๐—ฝ๐—ฟ๐—ถ๐—ผ๐—ฟ๐—ถ๐˜๐—ถ๐˜‡๐—ฒ๐—ฑ ๐—ฑ๐˜‚๐—ฟ๐—ถ๐—ป๐—ด ๐˜๐—ฟ๐—ถ๐—ฎ๐—ด๐—ฒ, reducing SOC visibility and increasing the risk of missed compromise. As a result, attackers gain stealthy persistence and hands-on control within the environment โš ๏ธ
โ—๏ธ At the time of analysis, most samples remain undetected on VirusTotal.

โšก๏ธ Behavioral analysis is essential for detecting threats like this. #ANYRUN Sandbox reveals the full execution chain, injection activity, C2 communication, and privilege escalation in real time, helping teams confirm malicious activity faster when traditional detection fails.

1๏ธโƒฃ The attack starts with ๐—ฆ๐—ฝ๐—ฎ๐—ป๐—ธ๐—Ÿ๐—ผ๐—ฎ๐—ฑ๐—ฒ๐—ฟ, a lightweight loader that retrieves the main payload from C2 over plain HTTP, escalates privileges, and injects it into ๐—ฒ๐˜…๐—ฝ๐—น๐—ผ๐—ฟ๐—ฒ๐—ฟ.๐—ฒ๐˜…๐—ฒ using classic DLL injection, establishing persistence via a Scheduled Task.

2๏ธโƒฃ Once loaded inside explorer.exe, ๐—ฆ๐—ฝ๐—ฎ๐—ป๐—ธ๐—ฅ๐—”๐—ง communicates with C2 over WebSocket and provides full remote access to the system. The full-featured variant supports ๐Ÿญ๐Ÿด ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐—ฐ๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ๐˜€ covering remote shell execution, file management (list/read/upload/delete/rename), process enumeration and killing, Windows service control (start/stop/restart), full registry CRUD, scheduled task manipulation, and software inventory.

๐Ÿ”— Execution chain:
SpankLoader โžก๏ธ Download from C2 โžก๏ธ Drop DLL to C:\ProgramData\ โžก๏ธ SeDebugPrivilege โžก๏ธ DLL injection into explorer.exe โžก๏ธ Scheduled Task (persistence) โžก๏ธ SpankRAT โžก๏ธ WebSocket C2 โžก๏ธ RAT ๐Ÿšจ

๐—™๐—ถ๐—ป๐—ฑ ๐˜๐—ต๐—ฒ ๐—ณ๐˜‚๐—น๐—น ๐—–๐Ÿฎ ๐—ฐ๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ ๐˜€๐—ฒ๐˜ ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ข๐—–๐˜€ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—บ๐—บ๐—ฒ๐—ป๐˜๐˜€ ๐Ÿ“Œ

๐Ÿ‘จโ€๐Ÿ’ป See the analysis session: https://app.any.run/tasks/56306614-e569-4ace-a9ce-b27c3b983618/?utm_source=mastodon&utm_medium=post&utm_campaign=spankrat_analysis&utm_content=linktoservice&utm_term=160426

๐Ÿ” Use this TI Lookup query to pivot from IOCs, review related activity, and validate your detection coverage: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=spankrat_analysis&utm_content=linktotilookup&utm_term=160426#%7B%22query%22:%22url:%5C%22*/download/rmm_agent.dll*%5C%22%22,%22dateRange%22:60%7D

๐Ÿš€ Strengthen your SOC, detect complex threats faster, and boost team performance with #ANYRUN: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=spankrat_analysis&utm_content=linktoenterprise&utm_term=160426

#cybersecurity #infosec

๐ŸŒƒ What keeps Healthcare CISOs up at night? The gap between detection & response

#ANYRUN fits mature SOC operations, unifying detection, enrichment, and reporting to contain incidents before they impact patient care

โšก๏ธ Streamline your team's workflows: https://any.run/by-industry/healthcare/?utm_source=mastodon&utm_medium=post&utm_campaign=healthcare&utm_content=linktohealthcare&utm_term=160426

โšก๏ธ #ANYRUN is built for modern SOC operations: a unified workflow from monitoring to response, and the ability to scale across enterprise SOCs and MSSPs. Hear our CCOโ€™s perspective ๐ŸŽฅ

Achieve more with #ANYRUN. Integrate for your team: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=CDM_interview&utm_content=linktoenterprise&utm_term=150426

SOC workflows remain reactive, with validation and analysis spread across environments, delaying detection and response โ—๏ธ

Integrating #ANYRUN with IBM QRadar SOAR brings investigation steps into one process. Set up proactive security in a few clicks:
https://any.run/cybersecurity-blog/ibm-qradar-soar-anyrun-integration/?utm_source=mastodon&utm_medium=post&utm_campaign=anyrun_ibm_qradar_soar_integration&utm_content=linktoblog&utm_term=150426

๐Ÿšจ Update Your Detection Rules: New In-Memory Loader

We caught a highly evasive #HanGhost loader, designed to bypass traditional detection through layered obfuscation and in-memory execution. This activity targets corporate users handling payments, logistics, and contract workflows, expanding exposure across critical operations.

โš ๏ธ The delivery chain combines obfuscated JavaScript, hidden PowerShell execution, and environment-variable staging.

In the second stage, the loader retrieves an image file and extracts an encrypted payload embedded at the end of the file, combining steganography with in-memory loading and making detection significantly harder โ—๏ธ

๐Ÿ‘พ The loader is used to deliver multiple malware families: #PureHVNC, #XWorm, #Meduza, #AgentTesla, and #Phantom, with some chains also deploying #UltraVNC, extending the impact from initial access to persistent remote control.

โšก๏ธ#ANYRUN Sandbox allows analysts to reconstruct the full execution chain, helping confirm complex multi-stage activity earlier and reduce MTTR.

๐Ÿ”— JavaScript-to-Payload execution chain:

JS โžก๏ธ PowerShell โžก๏ธ in-memory .NET assembly โžก๏ธ PNG payload โžก๏ธ Malware

๐Ÿ“ˆ The campaign shows wave-based activity, indicating ongoing development and scaling:

March 26 โ€” early cluster

April 1โ€“2 โ€” first large multi-family wave

April 3 โ€” focused wave (PureHVNC / AgentTesla / Phantom)

April 6 โ€” PureHVNC-heavy activity

April 7 โ€” new peak with split between PureHVNC and XWorm/Meduza clusters

April 8 โ€” multi-family wave (PureHVNC / Phantom / AgentTesla)

April 9โ€“13 โ€” more focused wave dominated by PureHVNC, with Phantom, DarkCloud, Formbook, and Meduza also present

๐Ÿ‘จโ€๐Ÿ’ป See the analysis session and collect #IOCs to speed up detection and response: https://app.any.run/tasks/cc26155e-e8e9-442b-b000-8d1a1435e7db?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktoservice&utm_term=130426

๐Ÿ” Use this TI Lookup query to pivot from IOCs, review related activity, and validate your detection coverage: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktotilookup&utm_term=130426#%7B%2522query%2522:%2522commandLine:%255C%2522bYPaSS%2520-Command%2520*iex%2520$env:%255C%2522%2522,%2522dateRange%2522:180%7D%20

๐Ÿ‘จโ€๐Ÿ’ป Equip your SOC with faster decisions and lower workload. See how #ANYRUN fits your workflows: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktoenterprise&utm_term=130426

#cybersecurity #infosec

โ—๏ธ MSSP growth brings higher alert volume and stricter SLAs.

Unifying detection, enrichment, and reporting with #ANYRUN helps teams support more clients while keeping service quality consistent โšก๏ธ

Explore how #ANYRUN strengthens MSSP growth at scale: https://any.run/mssp/?utm_source=mastodon&utm_medium=post&utm_campaign=mssp_growth&utm_term=080426&utm_content=linktomssplanding

โณ Every minute without execution context increases dwell time and business risk.

Integrate #ANYRUN into your current stack to reduce MTTR by 21 min per case and cut Tier 1 workload by up to 20%.

โšก๏ธ Close the gap between detection and decision-making: https://any.run/integrations/?utm_source=mastodon&utm_medium=post&utm_campaign=all_integrations_connectors&utm_term=070426&utm_content=linktointegrations

โš ๏ธ Encrypted HTTPS traffic remains one of the main reasons #phishing is harder to confirm quickly. Automatic SSL decryption significantly expands visibility in every #ANYRUN Sandbox session. See real-world examples:
๐Ÿ”น #EvilTokens. Decrypted traffic exposed hidden HTTPS API calls behind the OAuth Device Code phishing flow, revealing session control and attacker infrastructure: https://app.any.run/tasks/2e8014a8-a90a-41bf-90fa-aa65da40fd20/?utm_source=mastodon&utm_medium=post&utm_campaign=ssl_decryption_examples&utm_term=020426&utm_content=linktoservice

๐Ÿ”น#FlowerStorm. SSL decryption enabled early detection of this phishkit via POST requests to /google.php at initial page load, before any user interaction or data entry: https://app.any.run/tasks/25694db7-2771-480c-9ff0-773e399331d6/?utm_source=mastodon&utm_medium=post&utm_campaign=ssl_decryption_examples&utm_term=020426&utm_content=linktoservice

๐Ÿ”น Phishing via Telegram API. Decrypted traffic revealed data exfiltration through the Telegram Bot API, helping identify localized campaigns via encrypted traffic patterns: https://app.any.run/tasks/49484bb5-28ec-44ca-835a-9b3235bd6419/?utm_source=mastodon&utm_medium=post&utm_campaign=ssl_decryption_examples&utm_term=020426&utm_content=linktoservice

โšก๏ธ Reduce phishing risk across your organization. Integrate #ANYRUN into your SOCโ€™s triage & response workflows: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=ssl_decryption_examples&utm_term=020426&utm_content=linktoenterpriselanding

#cybersecurity #infosec

๐Ÿš‘ Limited context during analysis slowed triage and response at Health Shared Services, a healthcare organization supporting 130K+ endpoints

โšก๏ธ See how #ANYRUN changed their SOC workflow and allowed analysts to handle real threats with lower MTTR/MTTD: https://any.run/cybersecurity-blog/healthcare-success-story/?utm_source=mastodon&utm_medium=post&utm_campaign=healthcare_success_story&utm_term=020426&utm_content=linktoblog

โš ๏ธ #๐—ฆ๐˜๐—ฒ๐—ฎ๐—น๐—– ๐—ถ๐˜€ ๐—ป๐—ผ๐˜„ ๐—ฑ๐—ฒ๐—น๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐˜ƒ๐—ถ๐—ฎ ๐—ฎ ๐—–๐—น๐—ผ๐˜‚๐—ฑ๐—ณ๐—น๐—ฎ๐—ฟ๐—ฒ ๐—–๐—น๐—ถ๐—ฐ๐—ธ๐—™๐—ถ๐˜… ๐—ณ๐—น๐—ผ๐˜„, masking malicious activity behind trusted services. Behavioral analysis exposed a PowerShell-based execution chain used to download and run the payload while attempting to evade detection.

๐Ÿ‘พ The Process Tree reveals the payload chain: powershell.exe โžก๏ธ powershell.exe โžก๏ธ y3gag2iu.3wq.exe (StealC ๐Ÿšจ)

Multi-stage PowerShell execution and hidden payload delivery make early confirmation harder, slowing triage. #ANYRUN Sandbox helps analysts quickly validate the attack and reduce investigation time.

๐Ÿ‘จโ€๐Ÿ’ป See the analysis session and collect #IOCs to speed up detection and response: https://app.any.run/tasks/48e6b68d-dfa2-423e-8e7c-24cf8a6ef85b/?utm_source=mastodon&utm_medium=post&utm_campaign=cloudflare_clickfix&utm_term=010426&utm_content=linktoservice

โšก๏ธ Learn how #ANYRUN helps SOCs detect complex threats and contain incidents faster: https://any.run/features/?utm_source=mastodon&utm_medium=post&utm_campaign=cloudflare_clickfix&utm_term=010426&utm_content=linktosandboxlanding

โš™๏ธ Technical details:
ClickFix flow on diddyparty[.]click triggers PowerShell via Win+X โžก๏ธ I. A hidden command (-NoProfile -WindowStyle Hidden) enforces TLS 1.2, stages a random EXE in %TEMP%, pulls the payload via Invoke-WebRequest, executes it, and attempts cleanup. Full execution details are available in the Script Tracer tab.

๐Ÿ” IOCs:
diddyparty[.]click
3f0fe92c0e1c4663dcb851ce0fc97ddaed25b559be1d6e2cc0f66304ac652e38

#cybersecurity #infosec