Cybercriminals Using Powerful BatCloak Engine to Make Malware Fully Undetectable

13-06-2023
Share
Cybercriminals Using Powerful BatCloak Engine to Make Malware Fully Undetectable

A fully undetectable (FUD) malware obfuscation engine named BatCloak is being used to deploy various malware strains since September 2022, while persistently evading antivirus detection.

The samples grant “threat actors the ability to load numerous malware families and exploits with ease through highly obfuscated batch files,” Trend Micro researchers said.

About 79.6% of the total 784 artifacts unearthed have no detection across all security solutions, the cybersecurity firm added, highlighting BatCloak’s ability to circumvent traditional detection mechanisms.

The open-source tool, although taken down since it was made available via GitHub and GitLab in September 2022 by a developer named ch2sh, has been advertised as an “EXE to BAT crypter.” It has since been cloned and modified by other actors and ported to languages such as Rust.

Malware Fully Undetectable

BatCloak is said to have received numerous updates and adaptations since its emergence in the wild, its most recent version being ScrubCrypt, which was first highlighted by Fortinet FortiGuard Labs in connection with a cryptojacking operation mounted by the 8220 Gang.

What’s more, ScrubCrypt is designed to be interoperable with various well-known malware families like Amadey, AsyncRAT, DarkCrystal RAT, Pure Miner, Quasar RAT, RedLine Stealer, Remcos RAT, SmokeLoader, VenomRAT, and Warzone RAT.

“The evolution of BatCloak underscores the flexibility and adaptability of this engine and highlights the development of FUD batch obfuscators,” the researchers concluded.

“This showcases the presence of this technique across the modern threat landscape.”

 

Source: https://thehackernews.com/