


RTF document that carries Adwind, XTRAT, and Loki The exploited RTF document (TROJ_CVE201711882.UHAOBGG) seen below delivered the bundled set of Adwind, XTRAT, and Loki.įigure 2. Adwind detections between January 1 and April 17, 2018 were found to be the most affected regions.įigure 1. The U.S., Japan, Australia, Italy, Taiwan, Germany, and the U.K. This year, we saw 5,535 unique detections of Adwind between January 1 and April 17. The delivery of different sets of backdoors is believed to be a ploy used to increase the chances of system infection: If one malware gets detected, the other malware could attempt to finish the job. Notably, cybercriminals behind the Adwind-XTRAT-Loki and Adwind-DUNIHI bundles abuse the legitimate free dynamic DNS server hoptoorg. The spam campaign also delivered the info-stealer Loki (TSPY_HPLOKI.SM1).ĭUNIHI (VBS_DUNIHI.ELDSAVJ), a known VBScript with backdoor and worm capabilities, was also seen being dropped with Adwind via spam mail in a separate incident. jRAT (detected by Trend Micro as JAVA_ADWIND.WIL) alongside another well-known backdoor called XTRAT a.k.a XtremeRAT (BKDR_XTRAT.SMM). We discovered a spam campaign that delivers the notorious cross-platform remote access Trojan (RAT) Adwind a.k.a. PDT to provide SHA-256 hashes instead of SHA-1 hashes.
