FYAnti

Malware updated 4 months ago (2024-05-05T13:17:31.601Z)
Download STIX
Preview STIX
Fyanti is a highly sophisticated multi-layer malware loader module, used to deliver various malicious payloads such as SodaMaster (also known as DelfsCake, dfls, and DARKTOWN), P8RAT (also known as GreetCake and HEAVYPOT), and FYAnti (also known as DILLJUICE stage2). These payloads eventually load QuasarRAT (also known as xRAT), a remote access tool. The execution flow of the FYAnti involves two additional layers that culminate in implementing the final stage, which is the QuasarRAT. The first layer of the FYAnti loader decrypts an embedded .NET module and executes it using a technique known as CppHostCLR. The FYAnti malware has been linked to the APT10 group, a well-known cyber espionage group, due to similarities in techniques and tools used. This connection was highlighted in a Symantec blog post, where it was noted that the FYAnti loader, its unique export name "F**kY**Anti", the CppHostCLR injection technique for the .NET loader, and the use of QuasarRAT were similar to APT10's activities previously discovered by BlackBerry Cylance's threat research team. Furthermore, the A41APT campaign also showed parallels with APT10 activities, including the use of the Ecipekac Loader, FYAnti loader, the same unique export name, the CppHostCLR technique, and QuasarRAT as the final payload. Kaspersky has provided detailed information about the FYAnti loader through OpenTIP links associated with the malware's digital fingerprints. The three identified hashes, dd672da5d367fd291d936c8cc03b6467, f4c4644e6d248399a12e2c75cf9e4bdf, and 335ce825da93ed3fdd4470634845dfea, correspond to different versions of the FYAnti loader. The second layer of the FYAnti loader is responsible for searching a specific file in the infected system, further demonstrating the malware's complexity and sophistication.
Description last updated: 2024-05-05T12:59:24.192Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the FYAnti Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign