ElizaRAT: APT36 Targets Windows, Linux, and Android Systems in 2024

ElizaRAT, a sophisticated Remote Access Trojan (RAT) for Windows developed by the APT36 group, also referred to as Transparent Tribe, is making waves in the cybersecurity community. This notorious Pakistani threat actor group, known for targeting Indian government agencies, diplomatic personnel, and military installations, has now expanded its reach to major platforms including Windows, Linux, and Android systems.

Advanced Capabilities of ElizaRAT

First discovered in 2023, ElizaRAT showcases various advanced capabilities indicative of its high-level design and dangerous potential. Written in .NET with embedded .NET and assembly modules, it uses .CPL files for execution evasion and leverages cloud services such as Google, Telegram, and Slack for distribution and command-and-control (C2) communication. Among its other features, ElizaRAT deploys decoy documents or videos, utilizes IWSHshell for persistence, implements SQLite for temporary file storage, and generates and stores unique victim IDs.

Key Campaigns Involving ElizaRAT

Three key campaigns have been identified involving ElizaRAT: Slack, Circle, and Google Drive.

Slack Campaign

The Slack campaign employs SlackAPI.dll for its core functions and delivers malware using CPL files. This malware checks for new instructions every 60 seconds and sends and receives messages via specific Slack channels. The use of Slack’s infrastructure allows the malware to blend in with legitimate traffic, making detection more challenging.

Circle Campaign

Launched in January 2024, the Circle campaign introduces improved evasion techniques with a dropper component. Instead of cloud services, it uses a Virtual Private Server (VPS) and checks for the Indian Standard Time zone to ensure it targets the intended region. It registers victim information in specific files and communicates with a dedicated server for data exfiltration. This method enhances its stealth capabilities and effectiveness in data theft operations.

Google Drive Campaign

In the Google Drive campaign, ElizaRAT uses Google Cloud for C2 communication, downloading payloads from multiple VPS. The Trojan utilizes extensionhelper_64.dll and ConnectX.dll payloads, which are renamed to mimic legitimate software, such as SpotifyAB.dll. This tactic further obfuscates its presence, making it harder for security systems to detect and respond to the threat.

Infrastructure Analysis

The analysis of ElizaRAT’s infrastructure uncovered several IP addresses associated with its operations. Among these, some have been flagged as malicious or suspicious, including:

  • 84.247.135.235
  • 143.110.179.176
  • 64.227.134.248
  • 38.54.84.83
  • 83.171.248.67

Conclusion: An Evolving Cyberthreat

ElizaRAT is a sophisticated and highly advanced Remote Access Trojan (RAT) developed by the notorious APT36 group, also known as Transparent Tribe. This Pakistani threat actor group has been making significant waves within the cybersecurity community. Known for its high-profile cyber espionage activities, APT36 has primarily targeted Indian government agencies, diplomatic personnel, and military installations. With the development and deployment of ElizaRAT, their capability to infiltrate and gather intelligence has become even more formidable. Originally focusing on Windows systems, APT36’s malicious activities have now expanded their reach to major platforms, including Linux and Android systems. This cross-platform versatility makes ElizaRAT a potent tool for APT36’s cyber espionage missions, posing a significant and evolving threat to cybersecurity worldwide. The group’s ability to develop and adapt such sophisticated tools underscores the persistent and growing challenge that cybersecurity professionals must address.

Explore more

Revolutionizing SaaS with Customer Experience Automation

Imagine a SaaS company struggling to keep up with a flood of customer inquiries, losing valuable clients due to delayed responses, and grappling with the challenge of personalizing interactions at scale. This scenario is all too common in today’s fast-paced digital landscape, where customer expectations for speed and tailored service are higher than ever, pushing businesses to adopt innovative solutions.

Trend Analysis: AI Personalization in Healthcare

Imagine a world where every patient interaction feels as though the healthcare system knows them personally—down to their favorite sports team or specific health needs—transforming a routine call into a moment of genuine connection that resonates deeply. This is no longer a distant dream but a reality shaped by artificial intelligence (AI) personalization in healthcare. As patient expectations soar for

Trend Analysis: Digital Banking Global Expansion

Imagine a world where accessing financial services is as simple as a tap on a smartphone, regardless of where someone lives or their economic background—digital banking is making this vision a reality at an unprecedented pace, disrupting traditional financial systems by prioritizing accessibility, efficiency, and innovation. This transformative force is reshaping how millions manage their money. In today’s tech-driven landscape,

Trend Analysis: AI-Driven Data Intelligence Solutions

In an era where data floods every corner of business operations, the ability to transform raw, chaotic information into actionable intelligence stands as a defining competitive edge for enterprises across industries. Artificial Intelligence (AI) has emerged as a revolutionary force, not merely processing data but redefining how businesses strategize, innovate, and respond to market shifts in real time. This analysis

What’s New and Timeless in B2B Marketing Strategies?

Imagine a world where every business decision hinges on a single click, yet the underlying reasons for that click have remained unchanged for decades, reflecting the enduring nature of human behavior in commerce. In B2B marketing, the landscape appears to evolve at breakneck speed with digital tools and data-driven tactics, but are these shifts as revolutionary as they seem? This