Multi-Stage Campaign Delivers Amnesia RAT and Ransomware Using Defendnot to Disable Microsoft Defender

Multi-Stage Campaign Delivers Amnesia RAT and Ransomware Using Defendnot to Disable Microsoft Defender

A sophisticated multi-stage phishing campaign is targeting Russian users with Amnesia RAT and ransomware derived from the Hakuna Matata family, leveraging legitimate cloud infrastructure and a novel technique to disable Microsoft Defender.

The campaign, documented by Fortinet FortiGuard Labs, stands out for its abuse of defendnot—a tool that tricks Windows Security Center into believing another antivirus product is installed, causing Defender to disable itself to avoid conflicts.

Attack Chain

The infection begins with business-themed decoy documents delivered in compressed archives containing malicious Windows shortcut (LNK) files. The LNK files use double extensions with Russian-language filenames to masquerade as text files.

When executed, the shortcut runs a PowerShell command that retrieves a loader script from a GitHub repository. The attackers separate their infrastructure—hosting scripts on GitHub while staging binary payloads on Dropbox—to complicate takedown efforts.

The first-stage loader establishes a foothold, hides evidence of malicious activity, and notifies the operator via Telegram Bot API that execution was successful. After a deliberate 444-second delay, it retrieves a heavily obfuscated Visual Basic Script that assembles the next-stage payload directly in memory, avoiding disk artifacts.

Disabling Defender

Before deploying final payloads, the malware systematically neutralizes endpoint protection:

  • Configures Defender exclusions for ProgramData, Program Files, Desktop, Downloads, and temporary directories
  • Uses PowerShell to disable additional Defender protection components
  • Deploys defendnot to register a fake antivirus product, causing Defender to disable itself
  • Disables Windows administrative and diagnostic tools via Registry manipulation

Amnesia RAT Capabilities

The primary payload, Amnesia RAT, is retrieved from Dropbox and provides comprehensive data theft and remote control capabilities:

  • Steals credentials from browsers, cryptocurrency wallets, Discord, Steam, and Telegram
  • Captures screenshots every 30 seconds, webcam images, and microphone audio
  • Monitors clipboard and active window titles
  • Enables full remote interaction including shell command execution and arbitrary payload deployment
  • Exfiltrates data via Telegram Bot APIs, with larger datasets uploaded to third-party hosting services

Ransomware Component

The second payload is ransomware derived from the Hakuna Matata family, configured to encrypt documents, archives, images, media, source code, and application assets. Before encryption, it terminates processes that could interfere with its operation.

The ransomware also monitors clipboard contents and silently replaces cryptocurrency wallet addresses with attacker-controlled wallets to hijack transactions. The attack chain concludes with WinLocker deployment to restrict user interaction.

Related Activity

Fortinet notes connections to other campaigns targeting Russian organizations:

  • Operation DupeHike: Threat actor UNG0902 targeting HR and payroll departments with the DUPERUNNER implant, loading AdaptixC2 framework
  • Paper Werewolf: Using AI-generated decoys and Excel XLL add-ins to deliver the EchoGather backdoor

Mitigations

Microsoft recommends enabling Tamper Protection to prevent unauthorized changes to Defender settings and monitoring for suspicious API calls or Defender service changes.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire