Mayura Kathir
2025-09-09 04:10:00
gbhackers.com
Cybersecurity researchers at FortiGuard Labs have uncovered a sophisticated phishing campaign that deploys the MostereRAT remote access trojan to compromise Windows systems.
The malware leverages advanced evasion techniques and installs legitimate remote access tools like AnyDesk and TightVNC to maintain persistent, covert access to infected machines.
The attack begins with carefully crafted phishing emails targeting Japanese users, designed to appear as legitimate business inquiries.
Victims are directed to malicious websites that automatically download a weaponized Word document containing an embedded ZIP archive. The document displays a single instruction in English: “OpenTheDocument,” directing users to extract and execute the contained file.
Although part of the attack flow and its C2 domains were mentioned in a 2020 public report as being associated with a banking trojan.

It contains encrypted components bundled within its resources, including images of famous people used as decoys.
MostereRAT employs CreateSvcRpc, a custom RPC client that communicates directly with the ntsvcs named pipe to interact with Windows Service Control Manager, bypassing standard APIs like OpenSCManager and CreateService.
This technique allows the malware to create services with SYSTEM-level privileges while avoiding detection by security tools that monitor standard service creation methods.
Easy Programming Language Sophistication
A particularly noteworthy aspect of this campaign is its use of Easy Programming Language (EPL), a Simplified-Chinese-based programming language designed for beginners.
Instead of continuing to use Japanese for social engineering, the attackers present a single instruction.

The initial executable, document.exe, is based on the wxWidgets menu sample from GitHub and serves as a deployment tool.

The malware decrypts its payload using a simple SUB operation with the key value ‘A’ and deploys all components to C:\ProgramData\Windows.
The malware includes an EPK launcher and malicious EPK files that require the krnln.fnr runtime library for execution.
This approach provides an additional layer of obfuscation, as EPL-based malware is less commonly encountered in the threat landscape.
The EPL-based payload consists of multiple modules, each serving specific functions. Module 1 (maindll.db) handles persistence mechanisms, privilege escalation, security tool interference, and payload updates.
It establishes persistence through scheduled tasks named ‘Microsoft\Windows\winrshost’ and ‘Microsoft\Windows\winresume,’ configured to run automatically under both SYSTEM and Administrator accounts.
FortiGuard’s analysis reveals MostereRAT’s communication protocol uses a magic number 1234567890 followed by packet length and command identifiers.
The malware demonstrates sophisticated privilege escalation capabilities by leveraging the TrustedInstaller account, one of Windows’ most powerful service accounts.
The malware includes an EPK launcher and malicious EPK files that require the krnln.fnr runtime library for execution.

The module is then loaded into memory and its exported function “getVersion” is called.
Using code borrowed from the NSudo project, it duplicates process tokens and launches new instances with full elevated privileges, enabling unrestricted system access.
MostereRAT includes comprehensive lists of security product paths and names, targeting popular solutions including 360 Safe, Kingsoft Antivirus, Tencent PC Manager, Windows Defender, ESET, Avira, Avast, and Malwarebytes.
The malware employs Windows Filtering Platform (WFP) filters to block network traffic from detected security products, preventing them from transmitting detection data, alerts, or telemetry to their servers.
Module 2 (elsedll.db) provides the core remote access functionality, establishing secure communications with command and control servers using mutual TLS (mTLS) authentication.
The malware supports 37 different commands, enabling comprehensive system control including file operations, payload deployment, screen capture, and user enumeration.
The most significant aspect of MostereRAT’s operation is its deployment of legitimate remote access tools.
The malware can install and configure AnyDesk, TightVNC, and RDP Wrapper, providing attackers with multiple avenues for persistent remote access.
These tools are configured to grant exclusive access to the attackers while remaining hidden from legitimate users through registry modifications and window concealment techniques.
MostereRAT represents a significant evolution in remote access trojan capabilities, combining social engineering, advanced evasion techniques, and legitimate tool abuse to achieve persistent system compromise.
Organizations should implement comprehensive security awareness training, maintain updated security solutions, and monitor for unusual remote access tool deployments to defend against such sophisticated threats.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.