Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Three Lazarus RATs coming for your cheese

0
Medium
Published: Tue Sep 02 2025 (09/02/2025, 17:22:01 UTC)
Source: AlienVault OTX General

Description

This report analyzes three remote access trojans (RATs) used by a Lazarus subgroup targeting financial and cryptocurrency organizations. The RATs, named PondRAT, ThemeForestRAT, and RemotePE, were observed during incident response cases. PondRAT is a simple RAT used as an initial payload, while ThemeForestRAT offers more functionality and operates in-memory. RemotePE is a more advanced RAT deployed in later attack stages. The actor uses social engineering for initial access and employs various tools for network discovery. The report details the RATs' capabilities, command and control mechanisms, and similarities to previously known malware families. It highlights the actor's persistent threat and evolving tactics in targeting high-value financial targets.

AI-Powered Analysis

AILast updated: 10/04/2025, 00:08:26 UTC

Technical Analysis

This threat report details the activities of a Lazarus subgroup deploying three distinct Remote Access Trojans (RATs) — PondRAT, ThemeForestRAT, and RemotePE — targeting financial and cryptocurrency organizations. Lazarus is a well-known advanced persistent threat (APT) group with a history of cyber espionage and financially motivated attacks. The three RATs serve different roles in the attack lifecycle: PondRAT acts as a simple initial payload to establish a foothold; ThemeForestRAT is a more feature-rich RAT operating primarily in-memory to evade detection; and RemotePE is a sophisticated RAT used in later stages to maintain persistence and conduct extensive reconnaissance and data exfiltration. The attackers leverage social engineering techniques, such as phishing, to gain initial access, followed by deployment of these RATs to perform network discovery, credential harvesting, lateral movement, and command and control (C2) communications. The malware employs various evasion tactics, including in-memory execution and use of legitimate protocols for C2 traffic, complicating detection efforts. The report highlights the evolving tactics and persistent nature of the Lazarus subgroup, emphasizing their focus on high-value financial targets, particularly in the cryptocurrency sector. The attack chain reflects a multi-stage approach with increasing sophistication, indicating a well-resourced and capable adversary. The threat actors’ use of multiple RATs with overlapping but distinct capabilities allows flexible and adaptive operations tailored to the target environment.

Potential Impact

For European organizations, especially those in the financial and cryptocurrency sectors, this threat poses significant risks. Successful compromise can lead to unauthorized access to sensitive financial data, theft of cryptocurrency assets, disruption of financial operations, and reputational damage. The multi-stage RAT deployment enables attackers to maintain long-term persistence, increasing the likelihood of extensive data exfiltration and potential sabotage. Given the critical role of financial institutions in Europe’s economy and the growing adoption of cryptocurrency services, an intrusion by Lazarus could disrupt market confidence and cause financial losses. Additionally, the use of social engineering increases the risk of initial compromise even in organizations with strong perimeter defenses. The in-memory execution and advanced evasion techniques complicate detection and response, potentially allowing attackers to operate undetected for extended periods. This threat also raises concerns about compliance with European data protection regulations, as breaches involving personal or financial data could trigger regulatory penalties.

Mitigation Recommendations

European organizations should implement a layered defense strategy tailored to the specific tactics of this Lazarus subgroup. First, enhance phishing awareness and training programs to reduce the risk of social engineering-based initial access. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting in-memory execution and anomalous process behaviors associated with RATs like ThemeForestRAT. Network segmentation should be enforced to limit lateral movement opportunities post-compromise. Implement strict credential hygiene, including multi-factor authentication (MFA) for all remote access and privileged accounts, to mitigate credential theft and reuse. Monitor network traffic for unusual C2 patterns, especially those mimicking legitimate protocols, and employ threat intelligence feeds to detect known Lazarus infrastructure. Regularly audit and harden systems against known vulnerabilities that could be exploited in later stages. Incident response plans should be updated to include scenarios involving multi-stage RAT infections and incorporate threat hunting exercises focused on indicators of compromise related to these RATs. Finally, collaborate with European cybersecurity information sharing organizations to stay informed about emerging Lazarus tactics and indicators.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.fox-it.com/2025/09/01/three-lazarus-rats-coming-for-your-cheese/"]
Adversary
Lazarus
Pulse Id
68b727b93637b3a14f210baa
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash33c9a47debdb07824c6c51e13740bdfe
hash435c7b4fd5e1eaafcb5826a7e7c16a83
hash451c23709ecd5a8461ad060f6346930c
hash6f2f61783a4a59449db4ba37211fa331
hash7cc55f3cc2740e8818648efbec21615f
hashd3ee425502cb60db1e75ef5bfd232c72
hash1a6366a45cb892cf76af8ba25d114334f1e34532
hash24cc64543f339d701b7fe6c7e05f41cb54c9dc83
hash58b0516d28bd7218b1908fb266b8fe7582e22a5f
hash6f391d282a37b770abcedd08c4c0e2156076cd8e
hash7b6e6487b803bbe85d7466b89da51a269fa4fc29
hash159471e1abc9adf6733af9d24781fbf27a776b81d182901c2e04e28f3fe2e6f3
hash1a051e4a3b62cd2d4f175fb443f5172da0b40af27c5d1ffae21fde13536dd3e1
hash24d5dd3006c63d0f46fb33cbc1f576325d4e7e03e3201ff4a3c1ffa604f1b74a
hash2c164237de4d5904a66c71843529e37cea5418cdcbc993278329806d97a336a5
hash37f5afb9ed3761e73feb95daceb7a1fdbb13c8b5fc1a2ba22e0ef7994c7920ef
hash3c8f5cc608e3a4a755fe1a2b099154153fb7a88e581f3b122777da399e698cca
hash4715e5522fc91a423a5fcad397b571c5654dc0c4202459fdca06841eba1ae9b3
hash479cc0a490ffa98652683796c5cef12f3e6380107aac83321a9705048b801b54
hash4f6ae0110cf652264293df571d66955f7109e3424a070423b5e50edc3eb43874
hash59a651dfce580d28d17b2f716878a8eff8d20152b364cf873111451a55b7224d
hash5e40d106977017b1ed235419b1e59ff090e1f43ac57da1bb5d80d66ae53b1df8
hash6510d460395ca3643133817b40d9df4fa0d9dbe8e60b514fdc2d4e26b567dfbd
hash774c71664d5d25775478607e74555462773e525e18237947355228337f433a3b
hash7a05188ab0129b0b4f38e2e7599c5c52149ce0131140db33feb251d926428d68
hash85045d9898d28c9cdc4ed0ca5d76eceb457d741c5ca84bb753dde1bea980b516
hash8c3c8f24dc0c1d165f14e5a622a1817af4336904a3aabeedee3095098192d91f
hash973f7939ea03fd2c9663dafc21bb968f56ed1b9a56b0284acf73c3ee141c053c
hash9dddf5a1d32e3ba7cc27f1006a843bfd4bc34fa8a149bcc522f27bda8e95db14
hashaa4a2d1215f864481994234f13ab485b95150161b4566c180419d93dda7ac039
hashc66ba5c68ba12eaf045ed415dfa72ec5d7174970e91b45fda9ebb32e0a37784a
hashcc4c18fefb61ec5b3c69c31beaa07a4918e0b0184cb43447f672f62134eb402b
hashd998de6e40637188ccbb8ab4a27a1e76f392cb23df5a6a242ab9df8ee4ab3936
hashe4ce73b4dbbd360a17f482abcae2d479bc95ea546d67ec257785fa51872b2e3f
hashf0321c93c93fa162855f8ea4356628eef7f528449204f42fbfa002955a0ba528
hashf3b0da965a4050ab00fce727bb31e0f889a9c05d68d777a8068cfc15a71d3703
hashf4d8e1a687e7f7336162d3caed9b25d9d3e6cfe75c89495f75a92ca87025374b
hashff32bc1c756d560d8a9815db458f438d63b1dcb7e9930ef5b8639a55fa7762c9
hash10da1920639e009539ac4e8b8c740a2c335bf630
hash442f4abac74d844256e3ff60f929b358ded71881
hash56f9b97fee195ed8dea39552eac288aa58cfaf48
hashbddd1fb74bbed46f07743af28cb1e1468df3d3bd
hashbef8714787a76d33d74dc23e7c750e74b57f6f04
hashf8df313a370bc856a0f2c05c6d27e56c56b7448f

Ip

ValueDescriptionCopy
ip192.52.166.253

Domain

ValueDescriptionCopy
domainaes-secure.net
domainarcashop.org
domainazuredeploypackages.net
domainazureglobalaccelerator.com
domaincalendly.live
domaindpkgrepo.com
domainftxstock.com
domainjdkgradle.com
domainkeondigital.com
domainlatamics.org
domainlmaxtrd.com
domainnansenpro.com
domainoncehub.co
domainpaxosfuture.com
domainpicktime.live
domainpypilibrary.com
domainpypistorage.com
domaingo.oncehub.co
domainwww.natefi.org
domainwww.plexisco.com

Threat ID: 68b742daad5a09ad00e7dc9c

Added to database: 9/2/2025, 7:17:46 PM

Last enriched: 10/4/2025, 12:08:26 AM

Last updated: 10/19/2025, 12:21:18 PM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats