New Chinese Malware Attack Framework Targets Windows, macOS, and Linux Systems

Teilen:

A previously undocumented command-and-control (C2) framework dubbed Alchimist is likely being used in the wild to target Windows, macOS, and Linux systems.

“Alchimist C2 has a web interface written in Simplified Chinese and can generate a configured payload, establish remote sessions, deploy payload to the remote machines, capture screenshots, perform remote shellcode execution, and run arbitrary commands,” Cisco Talos sagte in einem Bericht, der mit The Hacker News geteilt wurde.

Written in GoLang, Alchimist is complemented by a beacon implant called Insekt, which comes with remote access features that can be instrumented by the C2 server.

The discovery of Alchimist and its assorted family of malware implants comes three months after Talos also detailed another self-contained framework known as Manjusaka, which has been touted as the “Chinese sibling of Sliver and Cobalt Strike.”

Even more interestingly, both Manjusaka and Alchimist pack in similar functionalities, despite the differences in the implementation when it comes to the web interfaces.

“The rise of ready-to-go offensive frameworks such as Manjusaka and Alchimist is an indication of the popularity of post-compromise tools,” Talos researchers told The Hacker News.

“It is likely that due to the high proliferation and detection rates of existing frameworks such as Cobalt Strike and Sliver, threat actors are developing and adopting novel tools such as Alchimist that support multiple functionalities and communication protocols.”

Alchimist C2 panel further features the ability to generate first stage payloads, including PowerShell and wget code snippets for Windows and Linux, potentially allowing an attacker to flesh out their infection chains to distribute the Insekt RAT binary.

The instructions could then be potentially embedded in a maldoc attached to a phishing email that, when opened, downloads and launches the backdoor on the compromised machine.

Although Alchimist has been utilized in a campaign which involved a mix of Insekt RAT and other open source tools for carrying out post-compromise activities, the threat actor’s delivery vehicle remains something of a mystery.

“The distribution and advertising vector for Alchimist is also unknown — underground forums, marketplaces, or open source distribution such as the case for Manjusaka,” Talos said.

“Since Alchimist is a single-file based ready-to-go C2 framework, it is difficult to attribute its use to a single actor such as the authors, APTs, or crimeware syndicates.”

The trojan, for its part, is equipped with features typically present in backdoors of this kind, enabling the malware to get system information, capture screenshots, run arbitrary commands, and download remote files, among others.

What’s more, the Linux version of Insekt is capable of listing the contents of the “.ssh” directory and even adding new SSH keys to the “~/.ssh/authorized_keys” file to facilitate remote access over SSH.

But in a sign that the threat actor behind the operation also has macOS in their sights, Talos said it uncovered a Mach-O dropper that exploits the PwnKit vulnerability (CVE-2021-4034) to achieve privilege escalation.

“However, this [pkexec] utility is not installed on MacOSX by default, meaning the elevation of privileges is not guaranteed,” Talos noted.

The overlapping functions Manjusaka and Alchimist points to an uptick in the use of “all-inclusive C2 frameworks” that can be used for remote administration and command-and-control.

“A threat actor gaining privileged shell access on a victim’s machine is like having a Swiss Army knife, enabling the execution of arbitrary commands or shellcodes in the victim’s environment, resulting in significant effects on the target organization,” the researchers said.

https://thehackernews.com/2022/10/new-chinese-malware-attack-framework.html

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
6:38 am, Juli 10, 2025
Wetter-Symbol 17°C
L: 16° | H: 18°
overcast clouds
Luftfeuchtigkeit: 78 %
Druck: 1022 mb
Wind: 2 mph
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:55 am
Sonnenuntergang: 9:16 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
16° | 18°°C 0 mm 0% 7 mph 78 % 1023 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
20° | 30°°C 0 mm 0% 9 mph 65 % 1021 mb 0 mm/h
Sa. Juli 12 10:00 pm
Wetter-Symbol
18° | 30°°C 0 mm 0% 10 mph 72 % 1019 mb 0 mm/h
So. Juli 13 10:00 pm
Wetter-Symbol
17° | 31°°C 0 mm 0% 7 mph 66 % 1016 mb 0 mm/h
Mo. Juli 14 10:00 pm
Wetter-Symbol
20° | 32°°C 0 mm 0% 12 mph 65 % 1015 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 3 mph 78 % 1023 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
20° | 24°°C 0 mm 0% 4 mph 71 % 1023 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
26° | 30°°C 0 mm 0% 5 mph 51 % 1022 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
31° | 31°°C 0 mm 0% 6 mph 31 % 1021 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
29° | 29°°C 0 mm 0% 7 mph 32 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 7 mph 58 % 1021 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
21° | 21°°C 0 mm 0% 4 mph 62 % 1021 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 3 mph 65 % 1021 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€94,553.84
2.27%
Ethereum(ETH)
€2,367.26
6.56%
Fesseln(USDT)
€0.85
0.02%
XRP(XRP)
€2.07
4.57%
Solana(SOL)
€134.03
3.77%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.154215
5.96%
Shiba Inu(SHIB)
€0.000010
5.35%
Pepe(PEPE)
€0.000009
9.92%
Nach oben scrollen