Desert Dexter. Attacks on Middle Eastern countries

Authors:

Klimentiy Galkin, Junior Threat Intelligence Specialist, Positive Technologies Expert Security Center

Stanislav Pyzhov, Lead Threat Research Specialist, Positive Technologies Expert Security Center

Highlights

  • We have detected a malicious campaign targeting the Middle East and North Africa.
  • The campaign, which leverages social media to distribute malware, is tied to the region's current geopolitical climate.
  • The attackers host malware in legitimate online file-sharing accounts or Telegram channels set up specially for this purpose.
  • The malware itself is a modified version of AsyncRAT.
  • Since fall 2024, approximately 900 victims have been identified in various countries.

Introduction

In February, the Threat Intelligence Department team at the Positive Technologies Expert Security Center (PT ESC) discovered a malicious campaign targeting the Middle East and North Africa and active since September 2024. To distribute malware, the attackers create fake news groups on social media and publish advertisements containing links to a file-sharing service or Telegram channel. These links lead to a version of the AsyncRAT malware, modified to look for cryptocurrency wallets and communicate with a Telegram bot. A similar campaign was described by Check Point in 2019, but some of the techniques used in the kill chain have evolved since then.

Detailed analysis of the incidents and victims showed that Egypt, Libya, the UAE, Russia, Saudi Arabia, and Turkey were the most targeted countries. We have named the threat actor "Desert Dexter", after one of the suspected attackers. This story contains the full breakdown of their kill chain.

How the attack begins: ad posts

Our investigation has found that the attackers create temporary accounts and news channels on Facebook*. Later, these channels post ads like those shown below.

Ad post
Figure 1. Ad post
Map of detected ad posts
Figure 2. Map of detected ad posts

This is how the posts appear in the user's feed.

A promotional post as seen by the user
Figure 3. An ad post as seen by the user

The attackers bypass Facebook's* ad filtering rules, which vary by country. Here is an excerpt from the ad placement policy.

Excerpt from Facebook's* ad placement rules
Figure 4. Excerpt from Facebook's* ad placement rules

One of the posts in Arabic:

عاجل | تقرير مسرّب من مخا.ـبرات الاسرائـ ـ.ـيلية تكشف عن اجتماع سـ ـ.ـري بين مسؤول إماراتي "طحـ.ـن ون بن زايد" مع مسؤول سوري "ما.هر الأسد" يكشف ان هناك تخطيط لدخول سوريا باستعانة طائرات اسر.ائـ ـيلية  بدعم إماراتي .
لإطلاع على التقرير المسرب : https://files.fm/f/fgcnsf7r8v

Translation into English:

Urgent | A leaked report from Israeli intelligence reveals a secret meeting between an Emirati official "Tahna Bin Zayed" and a Syrian official "Maher Al-Assad" revealing that there is a plan to enter Syria with the help of Israeli aircraft with Emirati support. To view the leaked report: https://files.fm/f/fgcnsf7r8v

The ads also include a link to either Files.fm or Telegram channels that host a malicious file (see Figure 5). A distinct pattern emerges when examining these channel titles: they are trying to look like real media companies:

  • Libya Press,
  • Sky News,
  • Almasar TV,
  • The Libya Observer,
  • The Times Of Israel,
  • Alhurra TV,
  • VoiceQatar,
  • Step News Agency,
  • Watan,
  • Al Ain,
  • UAE Voice, and others.
Message containing a malicious archive in a Telegram channel
Figure 5. Message containing a malicious archive in a Telegram channel

Modifications of AsyncRAT

The kill chain consists of several stages. The victim receives a RAR archive from a Telegram channel or a link in an ad message. The archive contains either one or two BAT files, or a single JS file. These are designed to run a PowerShell script, which is either downloaded or extracted from a JavaScript file, to trigger the second stage of the attack.

Snippet of the BAT script
Figure 6. Snippet of the BAT script
Snippet of the JS file
Figure 7. Snippet of the JS file

It is worth noting that the comments in the JavaScript file are written in Arabic, possibly indicating the attacker's origin.

In the second stage of the attack, the PowerShell script terminates processes associated with .NET services that could prevent the malware from starting:

  • CCleanerBrowser.exe,
  • aspnet_regbrowsers.exe,
  • aspnet_compiler.exe,
  • AppLaunch.exe,
  • InstallUtil.exe,
  • jsc.exe,
  • MSBuild.exe,
  • RegAsm.exe,
  • cvtres.exe,
  • RegSvcs.exe.

It then deletes files with the extensions BAT, PS1, and VBS from C:\ProgramData\WindowsHost and C:\Users\Public, and creates a VBS file in C:\ProgramData\WindowsHost as well as BAT and PS1 files in C:\Users\Public, to run sequentially.

Snippet of the PowerShell script
Figure 8. Snippet of the PowerShell script

To establish persistence in the system, the script replaces the user startup folder in the registry with C:\ProgramData\WindowsHost by altering the Startup value in the keys Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders and Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders. After that, the PowerShell script generates a GUID for malware installation and saves it in the file %APPDATA%\device_id.txt, gathers system information, and sends it to the attackers' Telegram bot, formatted as follows.

Hack By WORMS:
- Device ID: <Malware installation GUID>
- HWID: <CPU or motherboard ID>
- Public IP: <External IP address>
- Country: <Country>
- Username: <Username>
- Computer Name: <Computer name>
- Antivirus: <Name of installed antivirus>

The script takes a screenshot, saves it as %TEMP%\screenshot.png, and sends it to the Telegram bot.

After all the preparatory steps, the Visual Basic, Batch, and PowerShell scripts run one by one to run/execute in memory the payload. Finally, the malware decodes a custom reflective loader written in C# and attempts to inject code, first into C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, and if that cannot be found, into C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe. Figure 9 shows the full kill chain.

Kill chain
Figure 9. Kill chain

This version of AsyncRAT uses a modified IdSender module, which checks browsers for a two-factor authentication extension and the following crypto wallet extensions:

  • Authenticator F2A (Brave, Chrome, Edge);
  • Binance Wallet (Chrome, Edge);
  • Bitget Wallet (Chrome);
  • BitPay (Chrome);
  • Coinbase Wallet (Chrome);
  • MetaMask (Brave, Chrome, Edge, Firefox, Opera, OperaGX);
  • Phantom (Brave, Chrome);
  • Ronin Wallet (Chrome);
  • TronLink (Chrome);
  • Trust Wallet (Chrome).

AsyncRAT also checks for the following crypto wallet applications:

  • Atomic Wallet,
  • Binance,
  • Bitcoin Core,
  • Coinomi,
  • Electrum Wallet,
  • Ergo Wallet,
  • Exodus,
  • Ledger Live.

Additionally, this modification of AsyncRAT includes a basic offline keylogger. It installs a hook with the help of the SetWindowsHookEx function, and logs pressed keys and the active process name to %TEMP%\Log.tmp.

Network infrastructure

The AsyncRAT configuration employs DDNS domains whose IP addresses belong to VPN services. However, given the small number of detected malicious files and domains, these IP addresses are essentially unique and can be used for attribution. Below is a diagram of the cluster we discovered, with the domain names exhibiting semantic similarity and the VPN IP addresses belonging to the same provider's network.

The network infrastructure being analyzed
Figure 10. The network infrastructure being analyzed

Download the network infrastructure being analyzed

Suspected Desert Dexter member

While reviewing messages sent to the hackers' Telegram bot, we noticed that some of the screenshots included snippets of a PowerShell script that contained logic for retrieving system information and communicating with the Telegram bot. Additionally, in one of the screenshots, we spotted Luminosity Link RAT, a tool whose creator was arrested in 2018. Some versions of the utility, including the one used by the attacker, can be found on GitHub.

Screenshot of the attacker's desktop
Figure 11. Screenshot of the attacker's desktop
Screenshot of the attacker's desktop with the PowerShell script
Figure 12. Screenshot of the attacker's desktop with the PowerShell script

Given that the malware takes a screenshot immediately after the victim's system is infected, a pattern can be identified. The screenshots with the PowerShell script were taken in a system named "DEXTER" or "DEXTERMSI". Furthermore, when a chat with the Telegram bot starts, the user sends a link to a channel that also contains the name dexter in the title. The substring ly in the channel name suggests a possible Libyan origin. This is confirmed by geolocation data sent by the malware and the Arabic comments in the PowerShell script. The attacker's channel showcases hacked iOS applications.

Messages from the Telegram bot with a screenshot of the attacker's infected system
Figure 13. Messages from the Telegram bot with a screenshot of the attacker's infected system
Messages in the chat with the bot, entered manually by the attacker
Figure 14. Messages in the chat with the bot, entered manually by the attacker
The attacker's Telegram channel
Figure 15. The attacker's Telegram channel

Victims

Figure 16. Number of potential victims across different countries

In the course of our analysis, we discovered about 900 potential victims. We identified them by using messages from the Telegram bot, specifically the Device ID field, and desktop screenshots sent to the bot. The majority of victims are ordinary users, including employees in the following sectors:

  • Oil production
  • Construction
  • Information technology
  • Agriculture

Takeaways

The Middle East and North Africa remain one of the world's most volatile regions. The geopolitical climate contributes to a significant number of cyberattacks there, aimed at both state agencies and everyday individuals, with these attacks becoming increasingly sophisticated. Political relations between nations are a common phishing lure.

The tools used by Desert Dexter are not particularly sophisticated. However, the combination of Facebook* ads with legitimate services and references to the geopolitical situation has led to the infection of numerous devices. By publishing posts alleging the leakage of confidential data, the group creates a kill chain that is universally applicable for infecting devices of both ordinary users and high-profile officials. We continue to track the activities of Desert Dexter in Arab countries.

Indicators of compromise

Network indicators

Indicator
https://files[.]fm/f/yqsvtu99kn
https://files[.]fm/u/y5dys7zp96
https://files[.]fm/f/t5pp6hv9w4
https://files[.]fm/f/9xxadwws3e
https://files[.]fm/f/jp4nmyz3e7
https://files[.]fm/f/62yub4t3xu
https://files[.]fm/f/3mtfufs9uu
https://files[.]fm/f/z945eq5r6d
https://files[.]fm/f/ykxqvg9zt4
https://files[.]fm/f/9kqrkq4wqu
https://files[.]fm/f/3npt84t4fn
https://files[.]fm/f/ux28ecfzvj
https://files[.]fm/f/nyxwvypjw9
https://files[.]fm/f/9hk7x9ppcg
https://files[.]fm/f/h5ufvb4xpc
https://files[.]fm/f/b4tvte22sv
https://files[.]fm/f/gdezxx73br
https://files[.]fm/f/wjmn8b82ge
https://files[.]fm/f/cjvc28m3j5
https://files[.]fm/f/2fwuanhk3t
https://files[.]fm/f/ts8hzkrmm9
https://files[.]fm/f/w89z65su8e
https://files[.]fm/f/v9dmzyk6ch
https://files[.]fm/f/54fvu5sr4x
https://files[.]fm/f/cg3yjvgtem
https://files[.]fm/f/n553v7ycsa
https://files[.]fm/f/evtg4qmz4f
https://files[.]fm/f/fgcnsf7r8v
https://files[.]fm/f/2fvbg9vr5r
https://files[.]fm/f/2deytc9v4n
https://files[.]fm/f/bp4jshj9yy
https://files[.]fm/f/fkgns7tc3g
https://files[.]fm/f/er3v3jte6c
https://files[.]fm/f/2eu98w8ghm
https://files[.]fm/f/w2269c2s3n
https://files[.]fm/f/pwkjge962n
https://t[.]me/NwesWaten
https://t[.]me/VoiceAE2024
https://t[.]me/ListNames1
https://t[.]me/News2025News
https://t[.]me/AlainNwes
https://t[.]me/UeaNwes
https://t[.]me/Al0Saa/
https://t[.]me/TheNwes2025
https://t[.]me/LibyaPrees
https://t[.]me/TheLensLy
https://t[.]me/TheLensNwes
https://t[.]me/NwesLibya
https://t[.]me/TVAlmasar
https://t[.]me/LaamNwes
https://t[.]me/NwesLibya2025
https://t[.]me/NewsStepAgency
https://t[.]me/AlhurraTVNwes
https://t[.]me/alwasatLY
https://t[.]me/AlmasarNewsTV
https://t[.]me/TheLibyaObserver
https://t[.]me/News2025Nwes
https://t[.]me/AlhurraTV2025
https://t[.]me/SkyNwes2025
https://t[.]me/StepNews2025
https://t[.]me/WatenNews1
https://t[.]me/SkyNewsBreaking
https://t[.]me/AlhurraTv2025
https://t[.]me/NwesLaam
https://t[.]me/AlmasarTVnews
https://t[.]me/News2025Breaking
https://t[.]me/NewsBreaking2025
https://t[.]me/TimeIsraelNEWS
https://t[.]me/VoiceQatar
https://t[.]me/ListNameAE
https://t[.]me/ListNameNwes
https://t[.]me/ListNamesSaudi
sexzsex1.ddnsfree[.]com
lovlysexy.freeddns[.]org
dick2024.ddnsfree[.]com
pdflove.ddnsfree[.]com
ohsexoh.freeddns[.]org
sex2024.freeddns[.]org
fuck1up.freeddns[.]org
ducksex.ddnsfree[.]com

File-based indicators

MD5SHA-1SHA-256
c18828769cf0ee4159b0f73bcb1febb53ace4c356fd2a7d359e59263d81de9a138da3eeb1791d00fbe569489f48cf5e56b9a2a9b71d3c17096df4982668f51d512b820c5
075fdf5c8b4409c1f39d175f4941c5da755649612fb6b8d31165dd729d6044e62a5a2c991d9a6edc55a547b9e522b3dd7f40aebc3f1c4761070294cc56e328800569fc45
7eda3a423372b7d39da6fb01d2a681d6767ff3096314e9a83177724b9fe9d2f04e8feae7630c9ae8b4cbbe71c78bdc6f7da81a7d5de00cd7d8157021fd0aec870248c9eb
f20f5bf86c65ad5d7d8e04f50e0fdd6ae5a2d21fff7ebc448e6cc58f4b10427f82033841b2e678427428898f46899140fea44fcad52acf5a614427981d357b23d5f77607
7d6aa05580c83825c688211f1e71b72ae1650405a2061dec28d8cb770964902028d0cf4adf07b378a833528cca8012ec0bd65f06372ccf23262b9930c246d8758cef342a
45801650db5dbc718c6bc5cace4832af246e5dbb718afdd6be95fda076724bcdca484e1d24f2877c5a47480f7873d8ae0c3f85ad16a3e656a058a92f38d358eb37cdc48f
cdc521cfab18cf6b0b72c87e9018120b7e3d8f52eaf5b17693a0ca98fa837d3349a35a4f704eabc86b2b3e7bc008059b59ceee8282847b08eb888c576b9105d0bd8f3c83
1946b638e4e2c0f5fdc371a9e9c01bc15c7903ebe2cb97475e5505a3116464423c6147068593a6c8fe6c98fd8c4d9b947e58066fd25bda10454da3f59b527a02795639e2
a7f582c808f39659a53feecef6c3ebfe2d27b137a1136cb96a746de8fff7d51dd5c014a8b9d613cf9ff332a3269223ed553e9806038de764f89abfe6f7f9cfe7595ad7a9
238f84f74dd3367c1068d31f025eb05eca13c7619f5fbac8ab0153ced50f1929f512b1ebd8b2ea2b8e256df386b1a55a1aabdb1ec8a96f6b7f13ab41d0641da8386d24e6
30fd61ec57dec347989030caaf0ec6e0e03b8fc93f8a7366adf3dcc482147f6fed1c4bb3260a773be1ad179da987b22a87abf2eaac93fdf26c4e37b053f1ab2bbf1add82
294c8b3bc2c198795b20efa684c35b651a2afb6af4b54fc266d4a66f848afcb990ce237eb7341efc8e08b5243091c23fd4775cf5b3b6227d7e15baf8ad9ed79cba74709d
013ecb281bf4f5c25e7823d522895cdb17f77c83a6dfa7f2a6ed5c65a3671434b48519505f3e6175c93e9f070f35d6c10c995b92264a06987af335a85d47fd8825562c3a
e0415f4d3d8122214a3098ec6baa8dc690f7996a7c2278c6fa1fba93c3ede85c946801066a117f3ba96c3ff1ac073f90e648a45ffb3f86566144ba526a17ff46d31d679f
195f42f7e6cc6416da279446c9fd10ee537bea04526fe7f01f84ea765fa6a89fcc51d9bf6f38b9d1db71631887f8a0cc241c2d3e74237ed30c4e46a26cf92d6702860795
6276af8151adad9b2e248faccae43d8366c8f50c0150e3c538a14608da68c7d928bb3d858e509cfc8711b0828cbdbac0e40a81628129015952d7011052068311c1e63063
a400fe79f7d615e35550a8a15cbc31a9d88d5110ebe30c8ad3fd215a4bd85388c6113076e61e533b6a88e899bf008d751725b2e3c52bf6871c80ce41ef4c520f7e4bf663
261d067103910dcdb5a966a9d6cbf917626e7394e9efb8b8496768d87de8d9288a0021d3f2225e97cb7f79fd2759117581a365300897860586aa12f3197def215ce3ef2a
50301fc5d522055e29b2122958263acc905592e41e54e1d971390cbbd99e9ead72efd8343014d48f6f667b6a6130b1ec2821073057c45a03f329ea6cecafc84784dd2252
64ddb41e380281a2440eb93af06c2fe7089e077bdba26833b848fac22a13d744aeb0b77031d36f325ba63cf9e08cf7c0c08099089206cb9de556549491a6874e7f9101c7
1a50f670c9d8a0c6ed60a26423f38c6c763068d2c6a7771584126956cc8fca76f5d8ee6c323fc0987bb2bc7d2f8aa1d6cb6db4901330b2874f01722ae5586ced09bba4fd
1b4e81246bc9bdcfa554d5c2343cde4b04533e810bd33936c596e7cfd30a36ba7204de394a3a95d68d85136618ab6f07674fb6ebd4a8e2fc373b5f5f9e0245d87ad9dfe3
27dc626f052cde7ca5c99e09ba2c3bc52bc44b1968fe3063310aea0ae3e7f56ccd826b1a6eebe78eaeed5994a575baa50964ee98edc0fbf03f23620aef0d76910754132f
f5c257cf1b96459ad985de4ee778e995c67cd9c5412a076b742e88f939dae496bdadba6d79434f9046555e2d4233f903af2bd99834d0b1f4e2abde2ed8a1aa095bdb24c3
4b667f53cd0abb72a05e1d16dacb094cbe57121278042b33d0cda331c8ae0d3bcf8e76c9b1aa718183fa5059da99b9b5955b660dc495db375cf75e1d6731061e6492c408
a2e1a80759ff915c795823c511e3e4e2946345327b619ccd2609fff063a5ad23ec55730fd20d221d0b3a49133e9d50509380b20179132549182353ea97acad47bd25a137
65e4b959ba44711fa63f9a7fefe32c24f4bb8280e17617d6e0332776e2b197d51f76f0e1d931dba26eee7bdc532111f006ec7973176f6b6b5dda4d23ea3fa700ccc8aef0
3fbc9d18f8e94a0b5b1e39134be7c153be9a946fae242ff3b59ed41e0847338dfc90c58fda58732f8c52ededed023e7d604dd10e295ad436884b990c8f13e6660cc42b5e
dcabbd8c5904e246164411eb63730b760f5c254b6ae8acb1dfadc7e4422e0c275b6a43cef722df5995b24216d2b5b3607213e25c361eafd00ed988d130f66e93af3f8d67
f77a293d7128c66a2d18b48af317280c519fc698d92f19f569dc7a129a9baac483cff8d3fb3461c4514b421b60181102b33ac2ac683021ce57fcf7741334d6cafe68ab7f
d13ea3bf14a05e4aa8d3f3aca89fe3277330d8a5ca8f8dc85657c3ec54fc4ff51b5cc00402ad851087bfb3a9fd7ead36727a4992de338de651fb9ff4c0269d5e2e55bce8
bc78a149c773196e9b7af9f2fef260e41333eb3ffe1dbd5efe7e2f2d70501ce715e833ff1579c6bcc9fa6f3565e3b74b26b5bf1c69c0671aec6bcace3d74d80fb4371c5b
bb997e1a845b20dd5c9ebc18ac716af277d340f6f6e6f25c412ec866664ffcf3144ca0d91c8c4612142e65286f455ea64ba41e6870bf6424fe2ac587848b2b8bd89ebd3e
11c6a227402d19f926adf61fdb6de8244d5fb4a91875a8403c9894774635c4619e4659b161bd750ff7331471320abc06ad99b7289a5c44f417d136f8af1b7db25ac0cb35
7dfa0cc4f95933e169f38ca80a99c86d103d0125a56947ffa1783a46a14ceda30b6cea8963c9f2a14e4edd0691ffc49e62d488077e6d6689d26e5af49fd8c392238bf1f7
97fbbb9968f5739a0cd7aadc1a1e254d76dda9bd72ef8a5a642a007b3074f922dc98d012a0d5afdbaa125751e238760386b08037c01d442aef37e12194b75d40dfa485c9
5eac13e41e72e235d9f0e303f36220a5a4b114b05eef3e9cb4109d8e76f27c8ed554d3ee2c27fad3bdeab8dab52b21562df4dbd8217a84fb2553c1f99de03d1c686137e7
7ef04955085db9621d592575b825a0e83ca892dceb68af13273e8877fde7776f043cb7e87348760bbb74159d0be1ebabe54c22f1e158780d9a76d0a73c5ed391491d563f
e59107b5d4866ab8f87c7f4561fb0d9739e904a06737e019fde4f47d1b13c264a76d3edcaf5eef159cf15e82dcf062a4865562b2721b2d1abb6dc26f454ba2b0008654cf
1e0ca1718e360353953eb1994fe901fc7002f6f240ae07d4b4b4f7db7bcc889117abb4efe0bd309a63d0daf9b231e4017176f788e987255f558712f372b085c0c13085fc
4527c576f1af0580c8d96ac23c8f761cdac3bf00eeb34c9c1d9dca63973f2e04da0453835dee2d0dd4d3eee97c372b6a8dbd3d3042d24b9483addfa9f8786617a88e268b
b7a1f3c523644788977f45b1539d3d5256bf9295b40a78534913a37095ff0abd8e8894efcca42f01a887d5261e9d389d8f82991c4a35c88eefd7e38afb90d70146ca15b0
33b6c435bdbbec12ae8cba21eb6d105f41d43dc4ec1187e6120f26158e074e39475b0815d4f4d3196d92b306f65ba4f1f90ec73403803530a58196b48db38210e3e3047d

MITRE ATT&CK techniques

IDNameDescription
Resource Development
T1585.001Establish Accounts: Social Media AccountsDesert Dexter creates Telegram and Facebook* channels, mimicking existing news agencies to disseminate ad posts
T1588.001Obtain Capabilities: MalwareThe group modifies AsyncRAT by adding a script for communicating with a Telegram bot
T1608.001Stage Capabilities: Upload MalwareDesert Dexter uploads malicious archives to the legitimate file-sharing service files.fm or Telegram channels
T1608.006Stage Capabilities: SEO PoisoningThe group uses Facebook's* advertising system to attract more victims
Initial Access
T1566.002Drive-by CompromiseIn its ad posts, the group provides a link to a RAR archive or a Telegram channel containing the archive
Execution
T1204.002

User Execution:

Malicious File

Desert Dexter attempts to trick victims into opening JavaScript or BAT scripts within the RAR archives
T1059.001

Command and

Scripting Interpreter:

PowerShell

Desert Dexter uses PowerShell scripts for persistence, system and user data collection, and payload execution
T1059.003

Command and

Scripting Interpreter:

Windows Command

Shell

The group uses BAT scripts in the initial and intermediate stages of the attack
T1059.005

Command and

Scripting Interpreter: Visual Basic

Desert Dexter employs VBS scripts in the intermediate stages of the attack
T1059.007

Command and

Scripting Interpreter:

JavaScript

The group utilizes JavaScript files in the initial and intermediate stages of the attack
Persistence
T1547.001

Boot or Logon

Autostart Execution:

Registry Run Keys /

Startup Folder

To establish persistence, the group replaces the startup folder in the user's registry with C:\ProgramData\WindowsHost by altering the Startup value in the keys Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders and Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Defense Evasion
T1140Deobfuscate/Decode Files or InformationDesert Dexter obfuscates both the scripts and the AsyncRAT code
T1620Reflective Code LoadingThe group uses a reflective loader written in C# to inject AsyncRAT into aspnet_compiler.exe
Collection
T1056.001Input Capture: KeyloggingDesert Dexter employs a modified version of AsyncRAT with an embedded offline keylogger that installs a keyboard hook using the SetWindowsHookEx function
T1074.001Data Staged: Local Data StagingDesert Dexter's modified AsyncRAT logs keystrokes and active process names to the %TEMP%\Log.tmp file
T1113Screen CaptureThe group deploys a script that takes a screenshot, saves it as %TEMP%\screenshot.png, and sends it to the Telegram bot
Command and Control
T1568Dynamic ResolutionDesert Dexter uses DDNS domains as C2 servers for AsyncRAT
T1571Non-Standard PortThe group uses port 6161 for AsyncRAT communication
Exfiltration
T1020.001Automated ExfiltrationDesert Dexter's AsyncRAT modification includes the IdSender module, which collects information on the system, user, browser extensions, cryptocurrency wallet management software, and two-factor authentication extensions
Impact
T1657Financial TheftThe group can obtain credentials for cryptocurrency wallets

Positive Technologies product verdicts

PT Sandbox

YARA rules

Verdict
tool_win_ZZ_MalPowerShell__RiskTool__FromBase64
tool_mem_ZZ_AsyncRAT__Backdoor
tool_win_ZZ_AsyncRAT__Backdoor__1
tool_win_ZZ_AsyncRAT__Backdoor

Behavioral verdicts

Verdict
Trojan.Win32.ObfBins.a
Trojan.Script.Dropper.kvlmyu
Trojan.Win32.Generic.a
Trojan.Script.Generic.a
Trojan-Dropper.Win32.LOLBin.a
Trojan.PowerShell.Generic.a
Trojan.Win32.Inject.a
Trojan.Win32.Generic.f
Trojan-Downloader.PowerShell.Generic.b
Trojan-Downloader.Win32.Generic.n

Network verdicts

Verdict
REMOTE [PTsecurity] AsyncRAT sid: 10004947
SPYWARE [PTsecurity] Trojan.Spyware Telegram checkin (APT Desert Dexter) sid: 10012983
SUSPICIOUS [PTsecurity] PowerShell Execution sid: 10002387
LOADER [PTsecurity] Trojan.Loader fakeimage loading sid: 10008279
POLICY [PTsecurity] IP Check Domain TLS (ipinfo.io) sid: 10007394
SUSPICIOUS [PTsecurity] QBot/AsyncRAT TLS JA3 fingerprint sid: 10007674
SUSPICIOUS [PTsecurity] Image Content type mismatch sid: 10007645
SUSPICIOUS [PTsecurity] Suspicious User-Agent (WindowsPowerShell) sid: 10008223
SUSPICIOUS [PTsecurity] POST Exfiltration via Telegram sid: 10009223

PT NAD

Verdict
REMOTE [PTsecurity] AsyncRAT sid: 10004947
SPYWARE [PTsecurity] Trojan.Spyware Telegram checkin (APT Desert Dexter) sid: 10012983
SUSPICIOUS [PTsecurity] PowerShell Execution sid: 10002387

MaxPatrol SIEM

Verdict
Execute_Malicious_Command
Suspicious_Connection
Script_Files_Execution
Connect_Suspicious_File_To_API_Telegram
DNS_Request_to_Suspicious_Domain

MaxPatrol EDR

Behavioral verdicts

Verdict
Suspicious_Create_Query_Dns_TelegramAPI
Shadow_Screen_save
Script_Files_Execution
Malware_Trojan_Win32_Generic_a
Windows_Autorun_Modification
Suspicious_Create_Process_TaskKill_TerminateProcess
Obfuscated_Powershell

YARA rules

Verdict
tool_win_ZZ_MalPowerShell__Dropper__PEInBase64
tool_win_ZZ_MalPowerShell__RiskTool__FromBase64

* Meta (Facebook) is currently prohibited in Russia.

Share this article:

Get in touch

Fill in the form and our specialists
will contact you shortly