ElizaRAT is a remote access trojan controlled by APT36, AKA Transparent Tribe. ElizaRAT has been used to target several high-profile entities in India and is most commonly distributed through phishing campaigns. Check Point has traced the distribution channels of ElizaRAT to Google, Slack, and Telegram primarily.
ElizaRAT was first discovered in September of 2023 but has since evolved in scope and complexity.
Recent research demonstrates that early campaigns used a distinct ElizaRAT variant to those that are currently circulating. Written in .NET, ElizaRAT executes commands through Control Panel (.CPL) files. ElizaRAT aims to infect devices that belong to:
In the vast majority of cases, the Telegram API is used for C2 communication. However, another prominent variant is stored as a Google Drive link, with file binaries ranging from around 4MB to 16MB.
There are four central phases that ElizaRAT moves through:
Transparent Tribe has launched several campaigns that make use of ElizaRAT over the past few years.
The first of these was a variant that primarily used Slack channels for C2 communication. This version was fortified by the additional deployment of the ApolloStealer payload. This version was then replaced by a new tactic, where APT36 would use a dropper to download and unpack compressed files that contained a new version of the ElizaRAT remote access trojan.
More recently, a campaign that uses Google Drive has been traced. This version utilizes malicious CPL files to drop ElizaRAT onto devices. Once within the data architecture, the trojan can construct a victim ID and establish a connection with the C2 server.
This most recent version also includes a USB stealer that can detect any external hard drives attached to a device and exfiltrate data from those.
While the main purpose of ElizaRAT is to exfiltrate data, its C2 connection means that it can execute a number of different payloads depending on the intentions of the malicious actor.
For example, ElizaRAT could deploy:
Especially considering that Transparent Tribe frequently targets high-value sectors and businesses, their ability to execute multiple payloads depending on the scenario is unsettling.
The vast majority of cases that contain ElizaRAT are located within India. The Pakistani group APT36 has used this trojan to infiltrate government, military, and high-power enterprises within India, either holding documents for ransom or exfiltrating them for other purposes.
The recent ApolloStealer version of ElizaRAT allows malicious actors to more precisely comb through systems when searching for specific files, allowing the group to cause more severe problems for affected agencies.
There are a number of defensive measures that businesses can take to protect against ElizaRAT and other forms of malware:
While preventing malware from entering a business ecosystem in the first place is always preferable, there may come a time when companies need to extract and remove malware that is living within their systems.
Here are a few strategies that you can use to remove malware:
The earlier a company notices something wrong with their systems, the less time malicious actors will have to cause damage.
The exfiltration of sensitive data is an extremely lucrative pursuit for malicious actors. Groups like APT36 will continuously work to improve their malware to:
Businesses need to constantly improve their existing cybersecurity systems to create robust and watertight defenses. Check Point offers Harmony Endpoint to monitor and protect digital devices across your company’s entire attack surface.
By identifying and neutralizing threats like ransomware, trojans, and malware before they become active, Harmony is able to offer an all-in-one protection solution for businesses. With extensive automation, Harmony Endpoint can work around the clock to keep your company safe. Get started today by requesting a demo.