Threat Advisory

Fake FileZilla Downloads Lead to RAT Infections Through Stealthy Multi-Stage Loader

Threat: Malware Campaign
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY:

A targeted malware campaign leveraging fake software distribution websites to deliver malicious payloads under the guise of legitimate tools. In this case, attackers impersonate the official FileZilla download page to trick users into downloading a trojanized installer. This technique relies heavily on social engineering, where users are deceived into trusting a seemingly authentic source. Once the user downloads and executes the installer, the infection chain is initiated without raising immediate suspicion. The campaign demonstrates a growing trend where threat actors exploit widely used open-source software to maximize infection success rates. By mimicking trusted brands and maintaining a near-identical interface, attackers significantly reduce user skepticism. The use of such deceptive distribution channels highlights the importance of verifying software sources before installation. Overall, the activity represents a coordinated malware campaign designed to distribute malicious components through user interaction, combining elements of impersonation, payload delivery, and execution to compromise systems effectively.

The technical behavior of the campaign reveals a multi-stage infection process initiated through a malicious installer disguised as legitimate software. Upon execution, the installer deploys additional components, including DLL files that are strategically loaded to execute malicious code. This DLL sideloading technique allows the malware to bypass traditional security controls by leveraging trusted application processes. The malware establishes persistence on the infected system and may perform further actions such as downloading additional payloads or communicating with external command-and-control infrastructure. Obfuscation techniques are often employed to evade detection and hinder analysis, making it difficult for security tools to identify malicious intent. The attack chain may also involve environment checks to ensure execution in a real user system rather than a sandbox. By embedding malicious logic within seemingly harmless files, attackers increase the stealth and longevity of the infection.

This campaign highlights the increasing risk associated with software supply chain abuse and deceptive distribution methods. By exploiting user trust in well-known software, attackers can achieve initial access without relying on traditional exploits. The use of DLL sideloading and staged payload delivery enhances the effectiveness of the attack while minimizing detection. Organizations and individual users must adopt strict security practices, such as downloading software only from verified sources and implementing robust endpoint protection solutions. Monitoring abnormal process behavior and network communication can also help detect such threats early in the attack lifecycle. Additionally, user awareness plays a critical role in preventing infections, as social engineering remains a key component of this campaign. The incident underscores the need for continuous vigilance against evolving malware delivery techniques. Strengthening both technical defenses and user education is essential to mitigate the impact of similar malware campaigns in the future.

THREAT PROFILE:

Tactic Technique ID Technique Sub-Technique
Reconnaissance T1593.001 Search Open Websites/Domains Social Media
Resource Development T1583.001 Acquire Infrastructure Domains
T1588.001 Obtain Capabilities Malware
Initial Access T1189 Drive-by Compromise -
T1204.002 User Execution Malicious File
Execution T1059 Command and Scripting Interpreter -
Persistence T1547.001 Boot or Logon Autostart Execution Registry Run Keys / Startup Folder
T1574.002 Hijack Execution Flow DLL
Defense Evasion T1027 Obfuscated Files or Information -
T1218.011 System Binary Proxy Execution Rundll32
Discovery T1082 System Information Discovery -
Command and Control T1071.001 Application Layer Protocol Web Protocols
T1105 Ingress Tool Transfer -

MBC MAPPING:

Execution E1204 User Execution
Anti-Behavioral Analysis B0009 Virtual Machine Detection
Collection F0002 Keylogging
E1113 Screen Capture
Command and Control B0030 C2 Communication
Communication Micro-objective C0002 HTTP Communication

REFERENCES:

The following reports contain further technical details:

https://cybersecuritynews.com/fake-filezilla-downloads-lead-to-rat-infections/

https://blog.alyac.co.kr/5738

crossmenu