Is the Abaddon RAT the first malware using Discord as C&C?

Abaddon is the first RAT that uses the freeware instant messaging and VoIP app and digital distribution platform Discord as a command & control server.

Researchers from MalwareHunterTeam have spotted a new piece of remote access trojan (RAT) dubbed ‘Abaddon’ that is likely the first malware using the Discord platform as command and control. The Abaddon malware connects to the Discord command and control server to check for new commands to execute.

"Abaddon" RAT (not related to "AbaddonPOS") sample: 74f58ab637713ca0463c3842cd71176a887b132d13d32f9841c03f59c359c6d7
For most of the features, just look at the screens…
Also from this sample: https://t.co/rz85DtuodC
Sounds like it is the first malware using Discord as full C2? pic.twitter.com/ewDH2NC7jv

— MalwareHunterTeam (@malwrhunterteam) October 22, 2020

Experts also warn that the author of the malware also developed a malware feature.

In the past, other threat actors already abused the Discord platform for different purposes, such as using it as a stolen data drop.

“In the past, we have reported on how threat actors use Discord as a stolen data drop or have created malware that modifies the Discord client to have it steal credentials and other information.” reported Bleeping Computer that first reported the news.

Abaddon implements data-stealing feature, it was designed to steal multiple data from the infected host, including Chrome cookies, saved credit cards, and credentials, Steam credentials, Discord tokens and MFA information.

The malware also collects system information such as country, IP address, and hardware information.

According to Bleeping Computer the malware supports the following commands:

Steal a file or entire directories from the computerGet a list of drivesOpen a reverse shell that allows the attacker to execute commands on the infected PC.Launch in-development ransomware (more later on this).Send back any collected information and clear the existing collection of data.

The malicious code connects to the Command & Control every ten seconds for new tasks to execute.

Experts pointed out that the malware also implements the commands to encrypt files of the infected system and decrypt them.

The ransomware feature appears to be under development.

window._mNHandle = window._mNHandle || {}; window._mNHandle.queue = window._mNHandle.queue || []; medianet_versionId = “3121199”; try { window._mNHandle.queue.push(function () { window._mNDetails.loadTag(“762221962”, “300×250”, “762221962”); }); } catch (error) {}

Pierluigi Paganini

(SecurityAffairs – hacking, Abaddon)

The post Is the Abaddon RAT the first malware using Discord as C&C? appeared first on Security Affairs.

Read the full article at https://securityaffairs.co/wordpress/109971/malware/abaddon-rat-discord-cc.html?utm_source=rss&utm_medium=rss&utm_campaign=abaddon-rat-discord-cc