{"id":197,"date":"2025-05-20T12:01:16","date_gmt":"2025-05-20T12:01:16","guid":{"rendered":"http:\/\/inforb-test1.certsign.ro:8080\/?p=197"},"modified":"2025-05-26T08:13:05","modified_gmt":"2025-05-26T08:13:05","slug":"notorious-wrnrat-delivered-mimic-as-gambling-games","status":"publish","type":"post","link":"https:\/\/inforb.ro\/en\/notorious-wrnrat-delivered-mimic-as-gambling-games\/","title":{"rendered":"WrnRAT infamously delivered in the form of gambling games"},"content":{"rendered":"<p>Hackers primarily target gambling due to the profitable financial opportunities it offers. The online gambling industry is a fertile ground for malicious actors seeking to exploit vulnerabilities for financial gain and data theft.<\/p>\n\n\n\n<p>Cybersecurity analysts from ASEC recently discovered that threat actors have been actively distributing the infamous WrnRAT, disguising it as gambling games.<\/p>\n\n\n\n<p>ASEC recently uncovered a sophisticated malware operation in which malicious actors created deceptive websites offering popular Korean gambling games such as \u201cbadugi,\u201d \u201ctwo-player go-stop,\u201d and \u201chold\u2019em\u201d to distribute malicious software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-wrnrat-delivered-as-gambling-games\"><strong>WrnRAT Delivered in the Form of Gambling Games<\/strong><\/h2>\n\n\n\n<p class=\"translation-block\">When users download what appears to be a game launcher, the system initiates a <strong>multi-stage infection process<\/strong>, in which a batch script (containing comments in Korean) is executed first, followed by a .NET-based malware dropper (distributed under filenames such as <em>\u201cInstaller2.exe\u201d<\/em>, <em>\u201cInstaller3.exe\u201d<\/em>, and <em>\u201cinstallerABAB.exe\u201d<\/em>). This dropper installs and executes the main malicious payload known as \u201cWrnRAT.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"559\" src=\"https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Deceitful-page-for-downloading-gambling-games-Source-ASEC-1024x559.jpg\" alt=\"\" class=\"wp-image-529\" srcset=\"https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Deceitful-page-for-downloading-gambling-games-Source-ASEC-1024x559.jpg 1024w, https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Deceitful-page-for-downloading-gambling-games-Source-ASEC-300x164.jpg 300w, https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Deceitful-page-for-downloading-gambling-games-Source-ASEC-768x419.jpg 768w, https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Deceitful-page-for-downloading-gambling-games-Source-ASEC.jpg 1364w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Deceptive page for downloading gambling games (Source \u2013 ASEC)<\/p>\n\n\n\n<p>This dropper operates by creating both a launcher component and the actual WrnRAT malware, executing WrnRAT through the launcher, and then self-destructing to evade detection.<\/p>\n\n\n\n<p>In the final stage, WrnRAT installs itself on the system, disguising itself as \u201cInternet Explorer\u201d by creating a file named \u201ciexplorer.exe\u201d to blend in with legitimate system processes.<\/p>\n\n\n\n<p>The malware was also distributed through HFS platforms, sometimes posing as computer optimization software, demonstrating the attackers\u2019 varied distribution strategies.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"404\" src=\"https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Platforms-used-for-malware-distribution-Source-ASEC-1024x404.jpg\" alt=\"\" class=\"wp-image-531\" srcset=\"https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Platforms-used-for-malware-distribution-Source-ASEC-1024x404.jpg 1024w, https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Platforms-used-for-malware-distribution-Source-ASEC-300x118.jpg 300w, https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Platforms-used-for-malware-distribution-Source-ASEC-768x303.jpg 768w, https:\/\/inforb.ro\/wp-content\/uploads\/2024\/09\/Platforms-used-for-malware-distribution-Source-ASEC.jpg 1119w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Platforms used for malware distribution (Source \u2013 ASEC)<\/p>\n\n\n\n<p>Once successfully installed, WrnRAT provides attackers with remote control over the infected system and allows them to steal sensitive information from the compromised machine.<\/p>\n\n\n\n<p>WrnRAT is a sophisticated malware developed using the Python programming language and packaged into an executable file using PyInstaller.<\/p>\n\n\n\n<p>This RAT primarily operates by capturing and transmitting screenshots from infected computers to the attacker\u2019s system.<\/p>\n\n\n\n<p>Moreover, it collects essential system information and has the capability to terminate certain active processes.<\/p>\n\n\n\n<p>The malware authors have expanded their toolkit by developing additional tools that modify firewall configurations to evade detection.<\/p>\n\n\n\n<p>The primary motivation of these malicious actors appears to be financial exploitation.<\/p>\n\n\n\n<p>They monitor users\u2019 games through unauthorized screenshots, leading to significant financial losses, especially for users accessing illegal gambling platforms.<\/p>\n\n\n\n<p>By observing players' hands, betting patterns, and strategies in real time using the screenshot capture functionality, attackers can gain unfair advantages or steal sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mitigations\"><strong>Preventive Measures<\/strong><\/h2>\n\n\n\n<p>Here are some essential preventive measures:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Download software only from official stores or verified sources.<\/li>\n\n\n\n<li>Ensure that you have a robust antivirus solution in place.<\/li>\n\n\n\n<li>Keep your device up to date with the latest security updates.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-iocs\"><strong>Indicators of Compromise (IOCs)<\/strong> <strong>(IoCs)<\/strong><\/h2>\n\n\n\n<p><strong>MD5<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">0159b9367f0d0061287120f97ee55513<br>03896b657e434eb685e94c9a0df231a4<br>0725f072bcd9ca44a54a39dcec3b75d7<br>0d9e94a43117a087d456521abd7ebc03<br>1b8dfc3f131aaf091ba074a6e4f8bbe6<\/pre>\n\n\n\n<p><strong>Suspicious URLs:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">http[:]\/\/112[.]187[.]111[.]83[:]5723\/installerABAB\/MicrosoftEdgeUpdate[.]exe<br>http[:]\/\/112[.]187[.]111[.]83[:]5723\/installerABAB\/bound[.]exe<br>http[:]\/\/112[.]187[.]111[.]83[:]5723\/installerABAB\/iexplore[.]exe<br>http[:]\/\/112[.]187[.]111[.]83[:]5723\/installerABAB\/installerABAB[.]cmd<br>http[:]\/\/112[.]187[.]111[.]83[:]5723\/installerABAB\/installerABAB[.]exe<\/pre>\n\n\n\n<p><strong>Suspicious FQDN Domains:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">aaba1[.]kro[.]kr<br>delete1[.]kro[.]kr<br>inddio23[.]kro[.]kr<br>nt89kro[.]kr<br>nt89s[.]kro[.]kr<\/pre>\n\n\n\n<p>Original article&nbsp;<a href=\"https:\/\/cybersecuritynews.com\/wrnrat-delivered-gambling-games\/\">Notorious WrnRAT Delivered Mimic As Gambling Games<\/a>&nbsp;published by&nbsp;<a href=\"https:\/\/cybersecuritynews.com\/\">Cyber Security News<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers mainly target gambling due to the profitable financial opportunities it offers. The online gambling industry is a fertile ground for malicious actors seeking to exploit vulnerabilities for financial gain and data theft.<\/p>","protected":false},"author":1,"featured_media":557,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"single-with-sidebar","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[39],"class_list":["post-197","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-homepage"],"_links":{"self":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":7,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"predecessor-version":[{"id":878,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/197\/revisions\/878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/media\/557"}],"wp:attachment":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}