Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
This report is an overview of the crypter-as-a-service, HCrypt. Similar to ransomware-as-a-service, HCrypt is sold to less technical malicious actors. The end goal of this malware is the installation of a user-defined RAT (remote access trojan) on the victim machine. The creation and scale of the malware have been attributed to malware author NYANxCAT, who is also attributed with writing MassLogger, AsyncRAT, and LimeRAT.
As is frequently seen with malware campaigns, phishing is the initial attack vector for this malware. HCrypt relies on user-defined C&C (command and control) infrastructure to execute the attack. In total, Morphisec identifies six stages of HCrypt.
The purpose of the initial phishing email is to deliver a JavaScript file as an attachment or link but could theoretically be delivered through other means outside of phishing. Within the JavaScript is code to download additional files from the C&C server to be used within later stages of the attack. Currently analyzed attacks reveal that files downloaded from the C&C server have a consistent naming scheme such as encoding.txt, ALL.txt, Startup.txt, Server.txt. These files are used to execute malicious PowerShell commands and set up persistence on the victim.
Once the malicious JavaScript downloads from the C&C server, it attempts to establish persistence (seen as a scheduled task), bypass any anti-virus software installed on the host, and execute a PowerShell script. The PowerShell stage ultimately attempts to install the
user-defined RAT through a technique known as Process Hollowing to evade detection.
Note: The Avertium Threat Report analyzes one current threat that has been shared by threat intelligence networks across the globe. Used internally by the Avertium CyberOps Team, this report will outline a “top-of-mind” threat and how it ought to be addressed accordingly.
This informed analysis is based on the latest data available.