The “Evilnum” Group Is Now Deploying a New RAT Called “PyVil”

Last updated June 23, 2021
Written by:
Bill Toulas
Bill Toulas
Cybersecurity Journalist

The “Evilnum” group of actors has been pretty active during the past two years, and it appears that they are now going through major shifts in their toolset. The Cybereason Nocturnus team of researchers has been following them closely, and they report the emergence of a new RAT (remote access trojan) called “PyVil.” In addition to this custom tool, Evilnum is now using LaZagne as well, which helps them steal user credentials.

Evilnum is interested in UK and EU-based banks and financial organizations in general, which hasn’t changed. The group's main goal is to spy its targets and try to exfiltrate sensitive data like VPN passwords, browser cookies, email credentials, and classified documents.

The infection chain is now differentiating from what used to be typical in the past, and the actors are now using a single LNK file that poses as a utility bill or driver's license PDF. This file activates a JavaScript dropper, which sets up a scheduled task to retrieve the malicious binaries.

Evilnum_process

Source: Cybereason

The new payload is the PyVil RAT written in Python, which is obfuscated with extra layers to make its decompilation hard.

The Nocturnus researchers used memory dumps to do it anyway, so they report the following functionality in the PyVil’s code:

deobfuscated code

Source: Cybereason

When the RAT needs to phone back home to the C2, it does so via POST HTTP requests that feature RC4 encryption applied thanks to a hardcoded base64 key. In several recorded cases, PyVil RAT received a new Python module from the C2, which was basically a custom version of the LaZagne credential stealer.

infrastructure

Source: Cybereason

Finally, the infrastructure that supports the Evilnum operations seems to have grown significantly over the past couple of weeks, and so has the number of domain IP addresses associated with the group. This is indicative of the group’s goal to continue its malicious operations and actually up their game by deploying new tools and making sure that they are still able to remain undetected.

If you are among the potential targets, check out the full list of compromise indicators that could be enriched soon.

Read More:



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: