Summary
A recent malware campaign targeting Boeing suppliers involves the use of sophisticated techniques to deliver a stealthy backdoor. The attack chain begins with an RTF file containing malicious JavaScript, which downloads and executes a DOCX document. This DOCX document employs various obfuscation methods (Base64, zlib, byte reversal, ROT13, XOR) before decrypting and loading an encrypted DLL into memory without writing it to disk.
Key points of the campaign include:
- Initial Infection Vector: An RTF file with embedded JavaScript.
- Payload Delivery: A DOCX document that uses multiple layers of obfuscation.
- Persistence Mechanism: Registry key "RtkAudUService" mimicking a Realtek audio service, and a Microsoft-signed VBS script for relaunching the loader after reboots.
Security teams should monitor registry keys for suspicious entries like HKCU\Run\RtkAudUService, block Filemail.com URLs, and flag DOCX files with references to "aFChunk".
Full Article Overview
Initial Infection Vector: RTF File
The attack starts with an RTF file containing malicious JavaScript. This script is designed to download a DOCX document from the internet.
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



