{"id":2909,"date":"2025-07-18T11:58:40","date_gmt":"2025-07-18T09:58:40","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=2909"},"modified":"2025-07-18T12:26:10","modified_gmt":"2025-07-18T10:26:10","slug":"deedrat-backdoor-enhanced-by-chinese-apts-with-advanced-capabilities","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/deedrat-backdoor-enhanced-by-chinese-apts-with-advanced-capabilities\/","title":{"rendered":"DeedRAT Backdoor Enhanced by Chinese APTs with Advanced Capabilities"},"content":{"rendered":"\n<p>LAB52, the intelligence team at S2 Group, has uncovered a new phishing campaign deploying DeedRAT\u2014<a href=\"https:\/\/www.trendmicro.com\/es_es\/research\/24\/k\/earth-estries.html\">a modular backdoor attributed to Chinese threat actors<\/a>\u2014through adversary tracking efforts. The campaign leverages the legitimate signed binary <em>MambaSafeModeUI.exe<\/em>, part of the VIPRE Antivirus Premium software, which is vulnerable to DLL side-loading. This technique allows the attackers to load the DeedRAT payload into memory. <a href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/pt-esc-threat-intelligence\/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools\/\u21a9\">Although this threat group has previously exploited legitimate antivirus binaries to deliver the backdoor,<\/a> this marks the first time <em>MambaSafeModeUI.exe<\/em> has been observed in such activity.<\/p>\n\n\n\n<p>DeedRAT is a modular backdoor that allows the attacker to perform various actions on the victim&#8217;s computer, such as creating and modifying files, listing directories or executing additional code, among others. The analysed sample communicates with the C2 via TCP protocol, but it has been observed that the backdoor allows other protocols such as HTTP, DNS, UDP, PIPE or TLS. This campaign includes a new module called NetAgent that adds new capabilities to the sample, suggesting that the group behind the malware continues to actively update the artefact and add new functionality.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Analysis<\/h1>\n\n\n\n<p>The sample is a ZIP archive containing three files: the legitimate binary vulnerable Dll Side Loading MicRun.exe, the malicious DLL SBAMBRES.DLL and the encrypted file SBAMBRES.DLL.CC. The analysed sample is publicly available on VirusTotal and has only two detections at the time of analysis.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"611\" height=\"103\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen.png\" alt=\"\" class=\"wp-image-2912\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen.png 611w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-300x51.png 300w\" sizes=\"(max-width: 611px) 100vw, 611px\" \/><figcaption class=\"wp-element-caption\">Contents of the compressed file<\/figcaption><\/figure><\/div>\n\n\n<p>When the user runs MicRun.exe the DLL will get the path to the SBAMBRES.DLL.CC file using the GetModuleHandleW function, which will be decrypted in memory and executed as shellcode.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"349\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-2.png\" alt=\"\" class=\"wp-image-2914\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-2.png 794w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-2-300x132.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-2-768x338.png 768w\" sizes=\"(max-width: 794px) 100vw, 794px\" \/><figcaption class=\"wp-element-caption\">Loading the encrypted shellcode<\/figcaption><\/figure><\/div>\n\n\n<p>The sample will copy the contents of the compressed file to the folder &#8220;C:\\ProgramData\\MicroDefaults\\&#8221;.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"656\" height=\"159\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-3.png\" alt=\"\" class=\"wp-image-2915\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-3.png 656w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-3-300x73.png 300w\" sizes=\"(max-width: 656px) 100vw, 656px\" \/><figcaption class=\"wp-element-caption\">Creation of artifacts in &#8220;C:\\ProgramData\\Micro\\Defaults\\&#8221;<\/figcaption><\/figure><\/div>\n\n\n<p>By way of persistence, the attackers will generate a service with the name MicRun and a registry key in HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\MicRun.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"719\" height=\"173\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-4.png\" alt=\"\" class=\"wp-image-2916\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-4.png 719w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-4-300x72.png 300w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><figcaption class=\"wp-element-caption\">Persistence generated through registry key<\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"192\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-5.png\" alt=\"\" class=\"wp-image-2917\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-5.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-5-300x56.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-5-768x144.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Persistence generated through service<\/figcaption><\/figure><\/div>\n\n\n<p>It will then be re-launched again as a service within the svchost.exe process.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"381\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-6.png\" alt=\"\" class=\"wp-image-2918\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-6.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-6-300x112.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-6-768x286.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Creation of svchost.exe process<\/figcaption><\/figure><\/div>\n\n\n<p>The mutex <strong>BaseNamedObjects\\asdRFtDaDpobhkmfgUIYGBDURE<\/strong> will be created which will prevent two instances of the malware from running simultaneously.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"240\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-7.png\" alt=\"\" class=\"wp-image-2919\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-7.png 533w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-7-300x135.png 300w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/><figcaption class=\"wp-element-caption\">Generated Mutex<\/figcaption><\/figure><\/div>\n\n\n<p>The malware will communicate with C2 <strong>luckybear669.kozow.]com<\/strong> and ports 80 and 443 using TCP protocol.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"366\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-8.png\" alt=\"\" class=\"wp-image-2920\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-8.png 864w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-8-300x127.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-8-768x325.png 768w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/><figcaption class=\"wp-element-caption\">Communications<\/figcaption><\/figure><\/div>\n\n\n<h1 class=\"wp-block-heading\">DeedRAT: Identifying the threat<\/h1>\n\n\n\n<p>Several features of the malware have been identified that indicate that the analysed sample is DeedRAT. The first is the use of the 0xDEED4554 constant which is used to verify the integrity of the decrypted shellcode. In addition, the next phase will be compressed with the LZ1 algorithm which will be decompressed with the RtlDecompressBuffer API.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"859\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/Captura-desde-2025-07-03-10-30-31.png\" alt=\"\" class=\"wp-image-2921\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/Captura-desde-2025-07-03-10-30-31.png 751w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/Captura-desde-2025-07-03-10-30-31-262x300.png 262w\" sizes=\"(max-width: 751px) 100vw, 751px\" \/><figcaption class=\"wp-element-caption\">Verification header<\/figcaption><\/figure><\/div>\n\n\n<p>The artefact shall modify the exception handler of the process with the SetUnhandledException function to use a custom function. The malware will use this function as a debugging tool, writing all exceptions to the <strong>%ALLUSERSPROFILE%\\error.log <\/strong>file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"566\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-10-1024x566.png\" alt=\"\" class=\"wp-image-2923\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-10-1024x566.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-10-300x166.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-10-768x425.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-10-400x222.png 400w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-10.png 1208w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Error log file<\/figcaption><\/figure><\/div>\n\n\n<p>The malware uses a pseudorandom algorithm to generate strings used in different parts of the programm, such as the creation of commands or registry keys. As in previous campaigns, the seed of the algorithm is generated from the serial number of the system volume.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"539\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-11.png\" alt=\"\" class=\"wp-image-2924\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-11.png 560w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-11-300x289.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><figcaption class=\"wp-element-caption\">Pseudo-random generation function<\/figcaption><\/figure><\/div>\n\n\n<p>The malware uses the same algorithm to obfuscate modules using a technique known as <em>API hashing<\/em>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"582\" height=\"461\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-13.png\" alt=\"\" class=\"wp-image-2926\" style=\"width:568px;height:auto\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-13.png 582w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-13-300x238.png 300w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/><figcaption class=\"wp-element-caption\">Hashing function used<\/figcaption><\/figure><\/div>\n\n\n<p>The malware uses a system of plugins to add or remove functionality to the artefact. The function used to register each module is very similar to those used in other campaigns of the group.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"458\" height=\"596\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-14.png\" alt=\"\" class=\"wp-image-2927\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-14.png 458w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-14-231x300.png 231w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/><figcaption class=\"wp-element-caption\">Module registration function<\/figcaption><\/figure><\/div>\n\n\n<p>Furthermore, DeedRAT will not use a single memory region, but each module will use its own region with read and execute permissions.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"140\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-12.png\" alt=\"\" class=\"wp-image-2925\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-12.png 751w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-12-300x56.png 300w\" sizes=\"(max-width: 751px) 100vw, 751px\" \/><figcaption class=\"wp-element-caption\">Memory regions where the shellcode will be hidden<\/figcaption><\/figure><\/div>\n\n\n<p>Each module will be independent and will store its encrypted strings at the end of its own memory region. More sensitive strings, such as the C2 server string or persistence-related strings, will be hidden in the program heap using the same encryption algorithm.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"703\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-15-1024x703.png\" alt=\"\" class=\"wp-image-2928\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-15-1024x703.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-15-300x206.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-15-768x527.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-15.png 1032w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Example of encrypted strings in the heap<\/figcaption><\/figure><\/div>\n\n\n<h1 class=\"wp-block-heading\">New functionality<\/h1>\n\n\n\n<p>Changes in functionality have been identified in both the loader and DeedRAT compared to other samples analysed in public sources.<\/p>\n\n\n\n<p>Unlike previous versions, the loader protects the APIs it invokes with encryption, using a series of arithmetic operations.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"432\" height=\"289\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-16.png\" alt=\"\" class=\"wp-image-2929\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-16.png 432w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-16-300x201.png 300w\" sizes=\"(max-width: 432px) 100vw, 432px\" \/><figcaption class=\"wp-element-caption\">Protection by XOR encryption<\/figcaption><\/figure><\/div>\n\n\n<p>In addition, a number of irrelevant functions will be included whose only purpose is to confuse the analyst. These functions will not fulfil any meaningful task and will be integrated into the main routine.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"575\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-18.png\" alt=\"\" class=\"wp-image-2931\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-18.png 791w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-18-300x218.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-18-768x558.png 768w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"867\" height=\"530\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-17.png\" alt=\"\" class=\"wp-image-2930\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-17.png 867w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-17-300x183.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-17-768x469.png 768w\" sizes=\"(max-width: 867px) 100vw, 867px\" \/><figcaption class=\"wp-element-caption\">Junk functions<\/figcaption><\/figure><\/div>\n\n\n<p>While in previous versions the payload was protected by <strong>RC4<\/strong>, in this new variant the malicious payload is encrypted using a custom algorithm. This consists of using a <strong>linear congruential  generator (LCG)<\/strong>, a pseudo-random number generator, from which values will be generated and used to decrypt the sample using arithmetic operations. It will be used with <strong>constants 0x48BF and 0x39A40, which have not been identified in any other variants of the algorithm,<\/strong> and will be initialised with seed 0xA893. Despite not being cryptographically secure, LCG is easy to implement, difficult to detect and provides a basic layer of protection for the token, which might explain the attackers&#8217; decision to adopt it in this version.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"552\" height=\"227\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-19.png\" alt=\"\" class=\"wp-image-2932\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-19.png 552w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-19-300x123.png 300w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><figcaption class=\"wp-element-caption\">LCG used in the decryption process<\/figcaption><\/figure><\/div>\n\n\n<p>The main change observed in DeedRAT is the existence of a new module called NetAgent.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"675\" height=\"596\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-20.png\" alt=\"\" class=\"wp-image-2933\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-20.png 675w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-20-300x265.png 300w\" sizes=\"(max-width: 675px) 100vw, 675px\" \/><figcaption class=\"wp-element-caption\">NetAgent module<\/figcaption><\/figure><\/div>\n\n\n<p>The plugin is responsible for handling the various requests to the server, as well as handling multiple connections by creating threads. Although this module does not introduce any visible changes to the malware&#8217;s behaviour, its presence indicates that the malware is still under active development, adding new capabilities.<\/p>\n\n\n\n<p>In addition, it has been noted that, when setting persistence, an argument is now added to the command. This argument is generated by a pseudo-random function and varies depending on the machine on which it is executed and the type of persistence used. The value generated matches the regular expression <strong>&#8220;-[A-Z]{0,7}_[A-Z]{0,7}_[A-Z]{0,8}&#8221;<\/strong><strong>.<\/strong> Although no behavioural changes associated with this argument have been detected, it is presumed that it acts as a unique identifier of the machine as well as the persistence method used.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"719\" height=\"173\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-21.png\" alt=\"\" class=\"wp-image-2936\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-21.png 719w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/imagen-21-300x72.png 300w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><figcaption class=\"wp-element-caption\">Pseudo-randomly generated command<\/figcaption><\/figure><\/div>\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>This article analyses how the actors behind DeedRAT continue to abuse legitimate antivirus binaries vulnerable to the DLL Side-Loading technique as a means to deploy the DeedRAT malware, thus largely evading detection by security systems. In addition, the increased use of loader obfuscation techniques suggests that attackers are going to increasing lengths to protect their binaries. The presence of the new NetAgent module also indicates that the malware is still actively developing, constantly adding new capabilities and increasing the sophistication of its campaigns.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Indicators of Compromise (IOC)<\/h1>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Hashes<\/td><td>Description<\/td><\/tr><tr><td>52f489d47618db8dfb503d6da98cbd76d08b063cc7ce0aac02b03601b6cae6a1<\/td><td>New folder.zip<\/td><\/tr><tr><td>99a0b424bb3a6bbf60e972fd82c514fd971a948f9cedf3b9dc6b033117ecb106<\/td><td>SBAMRES.DLL<\/td><\/tr><tr><td>e356dbd3bd62c19fa3ff8943fc73a4fab01a6446f989318b7da4abf48d565af2<\/td><td>MicRun.exe<\/td><\/tr><tr><td>2d9107edad9f674f6ca1707d56619a355227a661163f18b5794326d4f81a2<br>803<\/td><td>SBAMRES.DLL.C<br>C<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Paths<\/td><\/tr><tr><td>C:\\ProgramData\\Micro\\Defaults<\/td><\/tr><tr><td>%ALLUSERSPROFILE%\\error.log<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Mutex<\/td><\/tr><tr><td>\\BaseNamedObjects\\asdRFtDaDpobhkmfgUIYGBDURE<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Registry Key<\/td><\/tr><tr><td>HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\MicRun<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>C2<\/td><\/tr><tr><td>luckybear669.kozow[.]com<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>[1] Trend Micro. (2024, November 25). <em>Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions<\/em>. Retrieved from <a class=\"\" href=\"https:\/\/www.trendmicro.com\/es_es\/research\/24\/k\/earth-estries.html\">https:\/\/www.trendmicro.com\/es_es\/research\/24\/k\/earth-estries.html<\/a><\/li>\n\n\n\n<li>[2] Positive Technologies Expert Security Center. (2023, July 18). <em>Space Pirates: A look into the group\u2019s unconventional techniques, new attack vectors, and tools<\/em>. Retrieved from <a href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/pt-esc-threat-intelligence\/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools\/\">https:\/\/www.ptsecurity.com\/ww-en\/analytics\/pt-esc-threat-intelligence\/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>LAB52, the intelligence team at S2 Group, has uncovered a new phishing campaign deploying DeedRAT\u2014a modular backdoor attributed to Chinese threat actors\u2014through adversary tracking efforts. The campaign leverages the legitimate signed binary MambaSafeModeUI.exe, part of the VIPRE Antivirus Premium software, which is vulnerable to DLL side-loading. This technique allows the attackers to load the DeedRAT [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":2950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[21,1],"tags":[4,79,22,83],"class_list":{"0":"post-2909","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apt","8":"category-uncategorised","9":"tag-apt","10":"tag-backdoor","11":"tag-china","12":"tag-deedrat","13":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/blog-dibujos-600x400.png","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/07\/blog-dibujos-600x600.png","author_info":{"display_name":"3722304989","author_link":"https:\/\/lab52.io\/blog\/author\/3722304989\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2909"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=2909"}],"version-history":[{"count":12,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2909\/revisions"}],"predecessor-version":[{"id":2952,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2909\/revisions\/2952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/2950"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=2909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=2909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=2909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}