Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

COVERT RAT: Phishing Campaign

0
Medium
Published: Mon Mar 16 2026 (03/16/2026, 15:29:07 UTC)
Source: AlienVault OTX General

Description

A sophisticated multi-stage infection chain targets Argentina's judicial ecosystem using spear-phishing tactics and authentic-looking judicial content. The campaign employs a carefully crafted ZIP archive containing a weaponized LNK shortcut, BAT-based loader script, and judicial-themed PDF decoy. The attack chain leads to the deployment of a Rust-based Remote Access Trojan (RAT) that demonstrates extensive anti-VM, anti-sandbox, and anti-debugging techniques. The RAT establishes a resilient command-and-control channel, supports modular commands for various malicious activities, and implements full lifecycle management. The operation, dubbed 'Operation Covert Access,' aims to secure long-term access within high-trust institutional settings, highlighting the need for improved defenses against socially engineered intrusion chains.

AI-Powered Analysis

AILast updated: 03/16/2026, 18:17:45 UTC

Technical Analysis

The COVERT RAT phishing campaign, dubbed 'Operation Covert Access,' represents a highly targeted and sophisticated attack against Argentina's judicial ecosystem. The attack begins with spear-phishing emails that contain a ZIP archive crafted to appear as legitimate judicial content. Inside the archive is a weaponized LNK shortcut file that, when executed, triggers a BAT-based loader script. This loader then deploys a Rust-based Remote Access Trojan (RAT), notable for its use of the Rust programming language which is less common in malware, potentially complicating detection and analysis. The RAT incorporates extensive anti-analysis features such as anti-virtual machine (VM), anti-sandbox, and anti-debugging mechanisms, which help it evade automated detection and forensic analysis tools. Once installed, the RAT establishes a robust command-and-control (C2) channel designed for resilience and stealth. It supports modular commands, allowing attackers to perform a wide range of malicious activities including data exfiltration, system reconnaissance, and lateral movement within the network. The campaign is designed for full lifecycle management, enabling attackers to maintain long-term access and control over compromised systems. The use of judicial-themed decoys and targeting of high-trust institutional environments indicates a strategic intent to infiltrate sensitive government sectors. Indicators of compromise include multiple file hashes and an IP address (181.231.253.69) associated with the C2 infrastructure. While no CVEs or known exploits are currently linked to this campaign, its complexity and targeted nature present a significant threat to judicial institutions and potentially other government sectors.

Potential Impact

This threat poses a significant risk to the confidentiality, integrity, and availability of judicial systems and sensitive legal data in Argentina. Successful compromise could lead to unauthorized access to confidential case files, manipulation or deletion of judicial records, and disruption of judicial operations. The RAT’s modular capabilities allow attackers to adapt their actions, potentially leading to espionage, data theft, or sabotage. The use of advanced anti-analysis techniques increases the likelihood of prolonged undetected presence, enabling attackers to maintain persistent access and expand their foothold within the network. The targeting of a high-trust institutional sector means the impact could extend beyond immediate data loss to undermine public trust in judicial processes. Additionally, the campaign’s sophisticated social engineering and multi-stage infection chain increase the difficulty of detection and response, potentially affecting other organizations with similar profiles or security postures. The medium severity rating reflects the targeted nature and complexity, but the potential for significant operational and reputational damage is high within affected organizations.

Mitigation Recommendations

1. Implement advanced email filtering solutions that can detect and quarantine spear-phishing attempts, especially those containing ZIP archives and LNK files. 2. Enforce strict attachment handling policies, blocking or sandboxing suspicious file types such as LNK and BAT scripts. 3. Conduct targeted user awareness training focused on recognizing socially engineered emails, particularly those mimicking judicial or governmental content. 4. Deploy endpoint detection and response (EDR) tools capable of identifying and mitigating Rust-based malware and detecting anti-analysis behaviors such as anti-VM and anti-debugging techniques. 5. Monitor network traffic for unusual connections, especially to known malicious IP addresses like 181.231.253.69, and implement network segmentation to limit lateral movement. 6. Use application whitelisting to prevent execution of unauthorized scripts and shortcuts. 7. Regularly update and patch systems to reduce attack surface, even though no specific CVEs are linked, to mitigate potential exploitation avenues. 8. Establish incident response plans tailored to multi-stage infection chains and conduct regular drills simulating similar attack scenarios. 9. Employ threat intelligence feeds to stay updated on emerging indicators and tactics related to this campaign. 10. Consider deploying deception technologies to detect and disrupt attacker activities early in the infection lifecycle.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.pointwild.com/threat-intelligence/covert-rat-phishing-campaign/"]
Adversary
null
Pulse Id
69b821c38b5e35d90728323e
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip181.231.253.69

Hash

ValueDescriptionCopy
hash02f85c386f67fac09629ebe5684f7fa0
hash233a9dbcfe4ae348c0c7f4c2defd1ea5
hash45f2a677b3bf994a8f771e611bb29f4f
hash976b6fce10456f0be6409ff724d7933b
hashdc802b8c117a48520a01c98c6c9587b5
hash347f09e2589435af084b5f19fc12e8fbdee16e1b
hash366a181e53291fbf35a49f0282fcf309ad35f3f4
hash427110f6a3741e57b93fa5ca7c6b7dc69b2b23d5
hash5d29707d63db3f6475351ecb91ec2fda661fc984
hashc5981c6f73ecf7b9606c78e0526bd933585ec09f
hash10bbc5e192c3d01100031634d4e93f0be4becbe0a63f3318dd353e0f318e43de
hash13adde53bd767d17108786bcc1bc0707c2411a40f11d67dfa9ba1a2c62cc5cf3
hash37e6da4c813557f09fa2336b43c9fbb4633e562952f5113f6a6a8f3c226854eb
hash4612c90cdfb7e43b4e9afe2a37a82d8b925bab3fd3838b24ec73b0e775afdb75
hash6ae4222728240a566a1ca8c8873eab3b0659a28437877e4450808264848ab01e

Threat ID: 69b84937771bdb1749174e11

Added to database: 3/16/2026, 6:17:27 PM

Last enriched: 3/16/2026, 6:17:45 PM

Last updated: 3/16/2026, 9:37:33 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses