Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
乌克兰计算机应急响应团队警告新的定向网络攻击活动,利用名为CABINETRAT的后门程序通过伪装成Excel插件的XLL文件传播。该恶意软件通过Signal应用分发,隐藏在与拘留越境者相关的文档中。CABINETRAT具备收集系统信息、执行命令和上传下载文件等功能,并采用多种反虚拟机和反分析技术以规避检测。 2025-10-1 07:11:19 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Malware / Incident Response

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT.

The activity, observed in September 2025, has been attributed to a threat cluster it tracks as UAC-0245. The agency said it spotted the attack following the discovery of software tools taking the form of XLL files, which refer to Microsoft Excel add-ins that are typically used to extend the functionality of Excel with custom functions.

Further investigation has uncovered that the XLL files are distributed within ZIP archives shared on the Signal messaging app, disguised as a document concerning the detention of individuals who had attempted to cross the Ukrainian border.

DFIR Retainer Services

The XLL, once launched, is designed to create a number of executables on the compromised host, namely an EXE file in the Startup folder, an XLL file named "BasicExcelMath.xll" in the "%APPDATA%\Microsoft\Excel\XLSTART\" directory, and a PNG image named "Office.png."

Windows Registry modifications are done to ensure persistence of the executable, after which it launches the Excel application ("excel.exe") with the "/e" ("/embed") parameter in hidden mode in order to ultimately run the XLL add-in. The main purpose of the XLL is to parse and extract from the PNG file shellcode that's classified as CABINETRAT.

Both the XLL payload and the shellcode come with a number of anti-VM and anti-analysis procedures to evade detection, including checking for at least two processor cores and at least 3GB of RAM, and the presence of tools like VMware, VirtualBox, Xen, QEMU, Parallels, and Hyper-V.

A full-fledged backdoor written in the C programming language, CABINETRAT is mainly designed to gather system information, a list of installed programs, screenshots, as well as enumerate directory contents, deleting specific files or directories, running commands, and carrying out file uploads/downloads. It communicates with a remote server over a TCP connection.

The disclosure comes days after Fortinet FortiGuard Labs warned of attacks targeting Ukraine by impersonating the National Police of Ukraine in a fileless phishing campaign that delivers Amatera Stealer and PureMiner for harvesting sensitive data and mining cryptocurrency from targeted systems.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/ukraine-warns-of-cabinetrat-backdoor.html
如有侵权请联系:admin#unsafe.sh