Threat Advisory

KazakRAT Malware Exploits MSI Files for System Access

Threat: Malware Campaign
Threat Actor Name: -
Threat Actor Type: -
Targeted Region: Kazakhstan, Afghanistan
Alias: -
Threat Actor Region: -
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY

This research highlights a long-running remote access campaign built around a Windows DLL-based implant referred to as KazakRAT . The activity was uncovered through infrastructure hunting and revealed a persistent cluster that had remained largely unreported for years. The malware focuses on basic espionage capabilities such as system profiling, file discovery, payload execution, and data exfiltration. Despite its simplicity, the campaign demonstrated longevity and consistency, with active command-and-control infrastructure and ongoing victim beaconing. KazakRAT is unobfuscated and communicates over plain HTTP, indicating a design that prioritizes reliability over stealth.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY

This research highlights a long-running remote access campaign built around a Windows DLL-based implant referred to as KazakRAT . The activity was uncovered through infrastructure hunting and revealed a persistent cluster that had remained largely unreported for years. The malware focuses on basic espionage capabilities such as system profiling, file discovery, payload execution, and data exfiltration. Despite its simplicity, the campaign demonstrated longevity and consistency, with active command-and-control infrastructure and ongoing victim beaconing. KazakRAT is unobfuscated and communicates over plain HTTP, indicating a design that prioritizes reliability over stealth.[emaillocker id="1283"]

An operational error by the adversary ultimately enabled defenders to gain visibility into live infections. KazakRAT is primarily delivered through MSI-based infection chains that install a malicious DLL and achieve persistence via Run registry keys executed with rundll32. Multiple variants were identified, differing slightly in delivery flow, decoy usage, and supported commands, but all shared the same core architecture. The implant beacons periodically to its C2 server using simple HTTP POST requests and executes commands returned in a minimal response format. Supported functionality includes drive enumeration, system information collection, directory listing, file transfer, and command execution using native Windows APIs.

Infrastructure reuse and configuration mistakes allowed researchers to correlate campaigns and reimplement both client and server behavior. KazakRAT campaign demonstrates that low-complexity malware can still support sustained and targeted operations over long periods. Incremental variant updates and consistent lure themes indicate active maintenance rather than abandoned tooling. While attribution remains inconclusive, targeting patterns and tooling overlap suggest a state-aligned espionage objective rather than opportunistic abuse. The campaign underscores how persistence, social engineering, and infrastructure management can outweigh technical sophistication. It also highlights the defensive value of long-term infrastructure tracking, as simple adversary mistakes can expose otherwise quiet and enduring operations.

THREAT PROFILE:

Tactic Technique ID Technique Sub-technique
Initial Access T1566.001 Phishing Spearphishing Attachment
Execution T1218.011 System Binary Proxy Execution Rundll32
Execution T1059.003 Command and Scripting Interpreter Windows Command Shell
Persistence T1547.001 Boot or Logon Autostart Execution Registry Run Keys / Startup Folder
Defense Evasion T1036.005 Masquerading Match Legitimate Name or Location
Discovery T1082 System Information Discovery
Discovery T1057 Process Discovery
Discovery T1083 File and Directory Discovery
Collection T1005 Data from Local System
Collection T1119 Automated Collection
Command and Control T1071.001 Application Layer Protocol Web Protocols
Command and Control T1105 Ingress Tool Transfer
Exfiltration T1041 Exfiltration Over C2 Channel

MBC MAPPING:

Objective Behaviour ID Behaviour
Persistence F0012 Registry Run Keys / Startup Folder
Command and Control B0030 C2 Communication
Discovery E1083 File and Directory Discovery
Execution E1059 Command and Scripting Interpreter
Collection B0030.004 Implant to Controller File Transfer
Defense Evasion F0005 Hidden Files and Directories

REFERENCES:

The following reports contain further
https://securityonline.info/hijacking-the-hackers-researchers-sinkhole-kazakrat-espionage-campaign/
https://ctrlaltintel.com/threat%20research/KazakRAT/#kazakrat

[/emaillocker]
crossmenu