Threat Advisory

SVG Attachment Delivers AsyncRAT in Colombian Judicial Phishing Campaign

Threat: Phishing Campaign
Threat Actor Name: -
Threat Actor Type: -
Targeted Region: Global
Alias: -
Threat Actor Region: -
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY

A phishing campaign uses a SVG. The SVG contains JavaScript that decodes an embedded base64 blob and opens a fake document viewer in the browser. That viewer forces a download of an HTA file which, when executed, drops a Visual Basic script. The VBS writes and runs an obfuscated PowerShell downloader that retrieves an encoded text blob and decodes it into a .NET assembly. That loader fetches an injector and the final RAT then performs an in-memory injection into a trusted Windows process to achieve stealthy execution.

The attack chains benign file types and native scripting to move from an image to an in-memory implant while keeping on-disk traces minimal. The SVG–s onclick handler builds an HTML blob which forces an HTA download. The HTA hides a base64 segment that becomes actualiza.vbs. The VBS writes a confusing PowerShell string which downloads a text file that, after simple character substitution and base64 decoding, yields classlibrary3.dll. That DLL acts as a loader and decoder, reconstructing a second .NET component that serves as an injector. The injector allocates memory and injects AsyncRAT into a system process. The RAT contains anti-VM and anti-analysis checks, persistence options (run key or scheduled task), process-killing routines, data collection, and an encrypted C2 channel.

This campaign shows how text-based image formats and basic web scripting can be repurposed into a reliable multi-stage installer that evades many static checks. By distributing functionality across SVG, HTML blob, HTA, VBS, PowerShell, and small .NET modules, each stage appears less suspicious while the final RAT runs inside a legitimate process for stealth. Detection at initial stages was limited, underlining the risk posed by client-side blobs and encoded payload streams. Expect more campaigns that chain everyday file types into loader sequences that in-memory execution and minimal obvious artifacts.

THREAT PROFILE:

Tactic Technique ID Technique Sub-technique
Initial Access T1566.001 Phishing Spearphishing Attachment
Execution T1218.005 Signed Binary Proxy Execution mshta/HTA execution
Execution T1059.001 Command and Scripting Interpreter PowerShell
Execution T1059.005 Command and Scripting Interpreter Visual Basic
Persistence T1547.001 Boot or Logon Autostart Execution Registry Run Keys
Persistence T1053.005 Scheduled Task Scheduled Task on logon
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1562.001 Impair Defenses Disable or kill security/monitoring tools
Defense Evasion T1055 Process Injection
Defense Evasion T1497 Virtualization/Sandbox Evasion
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1012 Query Registry
Collection T1125 Video Capture
Command and Control T1071 Application Layer Protocol
Command and Control T1105 Ingress Tool Transfer
Command and Control T1543 Create or Modify System Process
Exfiltration T1041 Exfiltration Over C2 Channel
Impact T1070 Indicator Removal

REFERENCES:

The following reports contain further technical details:
https://securityonline.info/svg-smuggling-fake-colombian-judicial-lure-deploys-asyncrat-via-malicious-hta-file/
https://www.seqrite.com/blog/judicial-notification-phish-colombia-svg-asyncrat/

crossmenu