{"id":9864,"date":"2017-10-13T08:10:04","date_gmt":"2017-10-13T16:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/13\/news-3637\/"},"modified":"2017-10-13T08:10:04","modified_gmt":"2017-10-13T16:10:04","slug":"news-3637","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/10\/13\/news-3637\/","title":{"rendered":"Decoy Microsoft Word document delivers malware through a RAT"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 13 Oct 2017 15:00:41 +0000<\/strong><\/p>\n<p>In this post, we take a look at a Microsoft Word document which itself is somewhat clean, but is used to launch a multi-stage attack that relies on the hyperlink feature in the OpenXML format. This then loads another document that contains an exploit.<\/p>\n<p>Most malicious Microsoft Office documents involve either macros, embedded scripts, or exploits and are typically delivered via email. In this case, the unsuspecting user opening the decoy Word document will trigger an automatic (no click or interaction required) download of a malicious RTF file that deploys an exploit (CVE-2017-8759), which ends up distributing the final malware payload.<\/p>\n<p>The several-step removed payload is a commercial Remote Administration Tool that, in this case, is used for nefarious purposes. Victims will be none-the-wiser as the infection process happens in the background, while their Word document finally loads what looks like legitimate content.<\/p>\n<p>While attackers could have sent the exploit-laced document first, that might have triggered detection and quarantine at the email gateway. Instead, the benign document acted as a kind of Trojan horse that made its way to the end user&#8217;s desktop, where it would finally show its real intent.<\/p>\n<p>The diagram below summarizes the different steps that this attack takes, from the original document all the way to the malware payload.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/CVE-2017-8759_flow.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20010\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/CVE-2017-8759_flow.png\" alt=\"\" width=\"750\" height=\"1156\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/CVE-2017-8759_flow.png 750w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/CVE-2017-8759_flow-195x300.png 195w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/CVE-2017-8759_flow-389x600.png 389w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<h3>Initial package<\/h3>\n<p>The initial document was reported by <a href=\"https:\/\/twitter.com\/xme\/\" target=\"_blank\" rel=\"noopener\">@xme<\/a> on <a href=\"https:\/\/twitter.com\/xme\/status\/915327938991656962\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>. A quick check using <a href=\"https:\/\/www.decalage.info\/python\/oletools\" target=\"_blank\" rel=\"noopener\">oletools<\/a>\u00a0indicates that the file has the OpenXML format and no macros.<\/p>\n<pre>FILE: Product Description.docx  Type: OpenXML  No VBA macros found.<\/pre>\n<p>Since OpenXML files are archives, they can be decompressed to reveal their content.<\/p>\n<pre>[CONTENT_TYPES].XML  _RELS\/.RELS  WORD\/_RELS\/DOCUMENT.XML.RELS  WORD\/DOCUMENT.XML  WORD\/MEDIA\/IMAGE1.EMF  WORD\/THEME\/THEME1.XML  WORD\/SETTINGS.XML  WORD\/WEBSETTINGS.XML  WORD\/STYLESWITHEFFECTS.XML  DOCPROPS\/CORE.XML  WORD\/STYLES.XML  WORD\/FONTTABLE.XML  DOCPROPS\/APP.XML<\/pre>\n<p>Opening <em>document.xml.rels<\/em> reveals an interesting external URL, pointing to another document.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/document.xml_.rels_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19968\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/document.xml_.rels_.png\" alt=\"\" width=\"731\" height=\"360\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/document.xml_.rels_.png 731w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/document.xml_.rels_-300x148.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/document.xml_.rels_-600x295.png 600w\" sizes=\"auto, (max-width: 731px) 100vw, 731px\" \/><\/a><\/p>\n<p>The relationship with <em>Id=&#8221;rID6&#8243;<\/em> is loaded by the main <em>document.xml<\/em> file. If we open the document without network connectivity (to prevent the automatic execution), we can spot where this object is located.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/embedded_OLEObject.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19987\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/embedded_OLEObject.png\" alt=\"\" width=\"965\" height=\"629\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/embedded_OLEObject.png 965w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/embedded_OLEObject-300x196.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/embedded_OLEObject-600x391.png 600w\" sizes=\"auto, (max-width: 965px) 100vw, 965px\" \/><\/a><\/p>\n<h3>The actual exploit: CVE-2017-8759<\/h3>\n<p>The remote file <em>saqlyf.doc<\/em> is downloaded and opened by <em>Product Description.docx\u00a0<\/em>into the Temporary Internet Files folder.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/2ndstage_file.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19970\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/2ndstage_file.png\" alt=\"\" width=\"792\" height=\"325\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/2ndstage_file.png 792w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/2ndstage_file-300x123.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/2ndstage_file-600x246.png 600w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><\/a><\/p>\n<p>This time, it is an RTF file.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/rtf1.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19988\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/rtf1.png\" alt=\"\" width=\"1128\" height=\"319\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/rtf1.png 1128w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/rtf1-300x85.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/rtf1-600x170.png 600w\" sizes=\"auto, (max-width: 1128px) 100vw, 1128px\" \/><\/a><\/p>\n<p>After we convert the hexadecimal encoding to binary (<a href=\"https:\/\/blog.didierstevens.com\/programs\/oledump-py\/\" target=\"_blank\" rel=\"noopener\">oledump<\/a>), we can spot another interesting URL.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/stream.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19989\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/stream.png\" alt=\"\" width=\"687\" height=\"574\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/stream.png 687w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/stream-300x251.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/stream-600x501.png 600w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/a><\/p>\n<p>At this point, we could be looking at CVE-2017-0199 if the server provided a MIME type response of application\/hta. But in this case, we have something different, and we can quickly spot the <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/09\/zero-day-used-to-distribute-finspy.html\" target=\"_blank\" rel=\"noopener\">SOAP-related bug<\/a> associated with CVE-2017-8759.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/SOAP.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19990\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/SOAP.png\" alt=\"\" width=\"874\" height=\"541\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/SOAP.png 874w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/SOAP-300x186.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/SOAP-600x371.png 600w\" sizes=\"auto, (max-width: 874px) 100vw, 874px\" \/><\/a><\/p>\n<p>The above code will parse and execute the content of the <em>oghujp.hta<\/em> file pictured below.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/VBScript.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19992\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/VBScript.png\" alt=\"\" width=\"1337\" height=\"955\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/VBScript.png 1337w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/VBScript-300x214.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/VBScript-600x429.png 600w\" sizes=\"auto, (max-width: 1337px) 100vw, 1337px\" \/><\/a><\/p>\n<p>The nasty bit is encoded with <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/613dxh46(v=vs.90).aspx\" target=\"_blank\" rel=\"noopener\">ChrW<\/a> but we can let VBScript do the work and output what it is in human, readable terms.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/powershell.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19991\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/powershell.png\" alt=\"\" width=\"611\" height=\"354\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/powershell.png 611w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/powershell-300x174.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/powershell-600x348.png 600w\" sizes=\"auto, (max-width: 611px) 100vw, 611px\" \/><\/a><\/p>\n<p>This is the final part of the exploitation phase, and it involves running PowerShell to download and run a binary.<\/p>\n<h3>Attack payload: a RAT<\/h3>\n<p>This attack was meant to install a commercial Remote Administration Tool known as Orcus Rat, which as seen previously was also hosted on the same server containing the exploit. The program is written in .NET and contains functions such as keylogging, remote desktop, or access to the webcam.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/orcus.png\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19972\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/orcus.png\" alt=\"\" width=\"785\" height=\"345\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/orcus.png 785w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/orcus-300x132.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/orcus-600x264.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/orcus-195x85.png 195w\" sizes=\"auto, (max-width: 785px) 100vw, 785px\" \/><\/a><\/p>\n<p>The file is concealed as <em>mozilla.exe<\/em> and periodically checks with its command and control infrastructure.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/mozilla.png\" data-rel=\"lightbox-10\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19973\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/mozilla.png\" alt=\"\" width=\"836\" height=\"267\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/mozilla.png 836w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/mozilla-300x96.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/mozilla-600x192.png 600w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/a><\/p>\n<p>While commercial RATs can be used for legitimate purposes, malicious actors often abuse them for their own sinister goals.<\/p>\n<h3>Diversion<\/h3>\n<p>Part of the malicious VBScript creates a fake document on the fly that is displayed to the user. If you look carefully, you will notice that the file is called <em>Document1<\/em>, therefore it&#8217;s an additional file to the original <em>Product Description.docx<\/em> one. It also contains too many typos (but that&#8217;s a debate for another day).<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/decoy.png\" data-rel=\"lightbox-11\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19993\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/decoy.png\" alt=\"\" width=\"1029\" height=\"765\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/decoy.png 1029w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/decoy-300x223.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/decoy-600x446.png 600w\" sizes=\"auto, (max-width: 1029px) 100vw, 1029px\" \/><\/a><\/p>\n<h3>Attack infrastructure<\/h3>\n<p>The exploit and payload used in this attack are served from a free file hosting site at <em>pomf[.]cat.<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/pomf.png\" data-rel=\"lightbox-12\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20005\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/pomf.png\" alt=\"\" width=\"742\" height=\"614\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/pomf.png 742w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/pomf-300x248.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/pomf-600x496.png 600w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/><\/a><\/p>\n<p>A cursory look at the site revealed that many other malicious files are also hosted on this platform. We have reached out and requested a takedown of the offending files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20006\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/files.png\" alt=\"\" width=\"647\" height=\"639\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/files.png 647w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/files-300x296.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/files-600x593.png 600w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/p>\n<h3>Protection<\/h3>\n<p>This type of attack relies on a little bit of social engineering to trick the user into opening a Word document, while the rest is handled by an exploit that was\u00a0<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2017-8759\" target=\"_blank\" rel=\"noopener\">patched<\/a>\u00a0just a month ago. It&#8217;s quite likely many machines out there are still vulnerable if those updates have not been applied in a timely fashion.<\/p>\n<p>Scanning for the original document at the gateway may not have returned anything due to its relatively benign nature, and this is why protection at the end point is so important. More and more attacks these days are modular and retrieve payloads on the fly in order to evade detection.<\/p>\n<p>Malwarebytes users are already protected against this exploit. Additionally, we detect the RAT as Backdoor.NanoCore.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19995\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/block.gif\" alt=\"\" width=\"744\" height=\"500\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Initial document (Product Description.docx)<\/p>\n<pre>01e45e5647f103ccc99311066d0625f24e79ec8462b131d026b7a557a18d7616<\/pre>\n<p>RTF (CVE-2017-8759)<\/p>\n<pre>a.pomf.cat\/saqlyf.doc  5758c31928c5f962fbb3ec2d07130e189a8cf4f3fbd0cd606cb1c1d165334a1c<\/pre>\n<p>PNG (CVE-2017-8759)<\/p>\n<pre>a.pomf.cat\/uczmbn.png  5ed4582313d593a183ab0b8889dc3833c382ce9ca810287d0fcf982275b55e60<\/pre>\n<p>HTA (CVE-2017-8759)<\/p>\n<pre>a.pomf.cat\/oghujp.hta  b048a2d2ea3bb552ac6e79e37fc74576a50c79b4d8c9fd73b1276baabc465ebf<\/pre>\n<p>Payload (RAT)<\/p>\n<pre>a.pomf.cat\/aqzhnk.exe  72041b65777a527667e73ccc5df95296f182e4787f4a349fcbe0220961dd0ed2<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/decoy-microsoft-word-document-delivers-malware-through-rat\/\">Decoy Microsoft Word document delivers malware through a RAT<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/decoy-microsoft-word-document-delivers-malware-through-rat\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 13 Oct 2017 15:00:41 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/decoy-microsoft-word-document-delivers-malware-through-rat\/' title='Decoy Microsoft Word document delivers malware through a RAT'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/Untitled-design-1.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A Remote Administration Tool (RAT) is delivered via an unusual route: a benign-looking Microsoft Word document with an ulterior motive.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2017-0199\/\" rel=\"tag\">CVE-2017-0199<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2017-8759\/\" rel=\"tag\">CVE-2017-8759<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits\/\" rel=\"tag\">exploits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rat\/\" rel=\"tag\">rat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/word-exploits\/\" rel=\"tag\">Word exploits<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/decoy-microsoft-word-document-delivers-malware-through-rat\/' title='Decoy Microsoft Word document delivers malware through a RAT'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/decoy-microsoft-word-document-delivers-malware-through-rat\/\">Decoy Microsoft Word document delivers malware through a RAT<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11992,14742,10987,1810,10494,15755],"class_list":["post-9864","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2017-0199","tag-cve-2017-8759","tag-exploits","tag-rat","tag-threat-analysis","tag-word-exploits"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9864"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9864\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}