MostereRAT Deployed AnyDesk/TightVNC for Covert Full Access
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
A sophisticated phishing campaign targeting Japanese users employs MostereRAT, a Remote Access Trojan that utilizes advanced evasion techniques. The attack chain involves multiple stages, including an Easy Programming Language (EPL) payload, security tool disabling, and mTLS-secured C2 communications. The malware can deploy popular remote access tools like AnyDesk and TightVNC, granting attackers full system control. It employs techniques such as running as TrustedInstaller, blocking AV traffic, and creating hidden administrator accounts. The campaign's complexity and use of legitimate tools make detection and prevention challenging, highlighting the importance of user education and up-to-date security solutions.
OPENCTI LABELS :
phishing,remote access,evasion techniques,anydesk,mostererat,epl,mtls,tightvnc
AI COMMENTARY :
1. Introduction In the recent threat landscape, a phishing campaign targeting Japanese users has been uncovered, leveraging a sophisticated Remote Access Trojan known as MostereRAT. This malicious operation begins with a crafted phishing lure that entices victims into executing an Easy Programming Language payload. From its inception, the campaign demonstrates advanced evasion techniques, combining stealthy delivery with the ultimate goal of granting remote access to adversaries.
2. Attack Chain Overview The attack chain unfolds in multiple stages, each designed to evade detection and ensure persistence. After the initial phishing email delivers the EPL-based loader, the malware proceeds to disable security tools and manipulate system configurations. Communications between the infected endpoint and the command-and-control server are secured via mutual TLS, preventing simple network inspection. Once a foothold is established, the malware transitions to deploying legitimate remote access utilities.
3. Evasion Techniques MostereRAT is engineered with an array of evasion techniques. It can execute with TrustedInstaller privileges, effectively bypassing many security controls. The malware also obstructs antivirus traffic, ensuring that scanning and update services are disrupted. In addition, hidden administrator accounts are created to guarantee that even if the primary backdoor is discovered, secondary access remains. The use of mTLS for C2 channels further thwarts network-based detection and analysis.
4. Deployment of Remote Access Tools To solidify full system control, the actor leverages familiar remote access solutions such as AnyDesk and TightVNC. By deploying AnyDesk, attackers gain interactive screen-sharing capabilities, while TightVNC provides an alternative means to manipulate files and execute commands. These legitimate tools mask malicious activities under the guise of standard remote support software, complicating detection efforts by blending in with normal business operations.
5. Detection and Prevention Challenges The complexity of this campaign, coupled with its use of widely trusted applications, poses significant challenges for defenders. Traditional signature-based solutions struggle to differentiate between benign and malicious use of remote access software. The layered evasion techniques, from process injection to privilege escalation, further reduce the likelihood of early detection. Organizations without robust behavior-based monitoring are at elevated risk of prolonged compromise.
6. Mitigation Strategies Effective defense against this attack requires a combination of user education and advanced security solutions. Training programs should raise awareness of phishing tactics and the danger of executing unknown attachments. Endpoint detection and response tools must be configured to flag anomalous usage of TrustedInstaller privileges and the installation of hidden accounts. Network-level monitoring of mTLS sessions and strict application control policies can help prevent unauthorized deployment of AnyDesk, TightVNC, or other remote access utilities. Regular patching and least-privilege configurations round out a multilayered security posture.
OPEN NETMANAGEIT OPENCTI REPORT LINK!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
MostereRAT Deployed AnyDesk/TightVNC for Covert Full Access