Attackers continuously refine their methods to bypass conventional security measures. A recent discovery has shed light on a sophisticated multi-stage malware attack that leverages invoice-themed phishing emails to deploy a variety of malicious programs. This article delves into the intricacies of this threat and emphasizes the need for advanced defensive strategies.

Understanding the Threat: Multi-Stage Malware

Cybersecurity experts have identified an alarming trend where cybercriminals use deceptive invoice phishing emails to initiate a chain of malware infections. These emails typically contain attachments with Scalable Vector Graphics (SVG) files. When unsuspecting users click on these files, they trigger the malware’s infection sequence.

The Infection Mechanism

The process begins with an SVG file that, once activated, downloads a ZIP archive containing a batch script. This script is likely developed using an obfuscation tool known as BatCloak, which effectively disguises the malicious code to avoid detection by traditional antivirus solutions.

BatCloak and ScrubCrypt play pivotal roles in these attacks. BatCloak, which has been available for sale since late 2022, originated from another tool called Jlaive. Its main purpose is to load a secondary payload that can bypass standard detection technologies. ScrubCrypt, identified by Fortinet FortiGuard Labs in early 2023, is a crypter linked to cryptojacking campaigns by the 8220 Gang and is one of the iterations of BatCloak.

The Execution Phase

Once the initial script is executed, it unpacks a ScrubCrypt batch file, setting the stage for the final payload delivery. This includes the deployment of Venom RAT, a fork of Quasar RAT, which allows attackers to take control of the compromised systems. The malware sets up persistence on the host and implements techniques to bypass Anti-Malware Scanning Interface (AMSI) and Event Tracing for Windows (ETW) protections.

Venom RAT is designed to maintain communication with its command-and-control (C2) server to fetch additional plugins for a range of activities, including keylogging and data theft. Notably, it can also deploy other RATs like NanoCore, XWorm, and Remcos via its plugin system.

Impact on Data Security

The deployment of Venom RAT and its associated plugins results in significant threats to data security. One of the plugins is a stealer that targets information from wallets and applications such as Atomic Wallet, Electrum, and Telegram. This data is then exfiltrated to remote servers, putting sensitive information at risk.

Comprehensive Defense Strategies against Multi-Stage Malware

To counter such sophisticated attacks, organizations must implement a multi-layered security strategy that includes:

  • Education and Awareness: Regular training sessions for employees to recognize phishing attempts and suspicious emails.
  • Advanced Detection Tools: Utilizing security solutions that go beyond traditional antivirus programs to detect obfuscated scripts and encrypted payloads.
  • Incident Response: Developing a robust incident response plan that can be swiftly executed upon detection of a potential breach.
  • Regular Updates and Patches: Keeping all systems updated to mitigate vulnerabilities that could be exploited by attackers.

The recent findings highlight the complexity and adaptability of modern cyber threats. By understanding the mechanisms behind these attacks and implementing comprehensive security measures, businesses can better protect themselves against the evolving tactics of cyber adversaries. It’s imperative to stay informed and vigilant, as the methods employed by attackers grow more sophisticated by the day.


For the latest insights on protecting your business from cyber threats and to learn more about our comprehensive security solutions, follow us on LinkedIn. You can also contact us directly through our website, or book a free consultation session to discuss how we can assist you in achieving the business security and resilience your organization needs.