电子邮件始终是恶意软件传播的常用途径。大多数此类恶意邮件会被垃圾邮件陷阱及其他安全过滤器拦截。但不法分子仍不断尝试各种新手段,试图绕过这些过滤机制。其中一种手段是为附件中的压缩文件使用异常的文件扩展名。例如,在本次案例中,邮件附件是一个本该使用 7-Zip 压缩格式扩展名的文件,但实际却是一个 ZIP 压缩包。在运行 Windows 11 系统的主机上,即使系统中并未安装 7-Zip 软件,文件管理器依然能从这个伪装成 7-Zip 格式(文件扩展名为.7z)的 ZIP 压缩包中提取出恶意软件。
感染链
电子邮件→附件压缩包→提取出扩展名为.bat 的脚本文件
A computer screen displaying an open email window with an attached PDF selected. An arrow points from the attachment to a minimized window showing the contents of the same PDF file first as a 7z file and then opened in a text editor to see the BAT file.
Screenshot of a Wireshark application displaying filtered network traffic, specifically highlighting Remcos RAT C2 traffic. The traffic includes data packets labeled with technical details such as IP addresses and protocols used. A separate section shows a Windows executable for a browser password viewer tool involved in the traffic.
该压缩包内嵌了伪装成业务单据的 BAT 脚本,脚本执行后触发多阶段攻击,包括建立与 C2 服务器 206.123.152.51:3980 的持久连接,部署 Remcos RAT 实现远程控制,通过 RAT 通道下发浏览器密码查看工具,在系统启动项植入多个持久化脚本,创建离线键盘记录数据文件 dasgbtisot.dat,以及修改注册表项 HKCU\Software\kmbgnrgsd-2X9W02 实现自启动 。
Screenshot of a computer file explorer window. The folder is named Roaming. The DAT file within is the data collection file for the offline keylogger. The open DAT file shows different timestamps and other information.
Screenshot of a Windows computer screen showing a folder named "Startup" in File Explorer with two files highlighted. One is for copying the malware to the Startup Menu. The other is the startup folder for persistent infection. Additionally, the Windows Registry Editor is open, displaying a registry update associated with the infection.