Malware

Parallax RAT used in attacks aimed at cryptocurrency entities

Experts warn of a new wave of attacks against cryptocurrency entities, threat actors are using a RAT dubbed Parallax RAT for Infiltration.

Researchers from cybersecurity firm Uptycs warns of attacks targeting cryptocurrency organizations with the Parallax remote access Trojan (RAT).

Parallax RAT has been distributed through malvertising and phishing campaigns since December 2019. The malware supports common RAT features, such as keylogging, capturing login credentials, accessing files, and remote control of infected systems.

The sample employed in recent attacks uses injection techniques to hide within legitimate processes and avoid detection. Upon successfully injecting the malicious code, threat actors can interact with their victim via Windows Notepad that likely serves as a communication channel.

Parallax RATParallax RAT

A first payload analyzed by the experts is written in C++, it is in the form of a 32-bit executable. It uses the process-hollowing technique to inject the RAT into a legitimate Microsoft pipanel.exe process

“It seems to have been intentionally obfuscated by threat actors (TA) wanting to hide something. Its fifth section seems to have been altered and is unusually large compared to the remainder.” reads the analysis published by the experts. “Moreover, this section has been marked with the “Code and Executable” flag, indicating it contains executable code. The TA was able to decrypt its content and use it to create a new binary, which we refer to as payload2 (i.e., Parallax RAT). Payload1 uses a technique known as process-hollowing to inject payload2 into a legitimate Microsoft pipanel.exe process that then gets launched by an attacker.”

The malware achieves persistence by creating a copy of itself in the Windows Startup folder.

The second payload, ParallaxRAT, gathers sensitive information from the infected machines.

Upon successfully infecting the victim’s machine, the malware notifies the attacker. They interact with the victim by posing questions via Notepad and instructing them to connect to a Telegram channel. 

The experts noticed that the operators can remotely shut down or restart the victim’s machine.

The content of the Telegram chat analyzed by the researchers revealed that the attackers have an interest in crypto companies.

The attackers gather private email addresses of cryptocurrency companies from the website, they use public service like dnsdumpster.com to find mail servers of the target organizations.

“It’s important for organizations to be aware of this malware’s existence and take necessary precautions to protect systems and data.” concludes the report that also provides Indicators of Compromise (IOCs).

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Parallax RAT)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi

On day two of Pwn2Own Berlin 2025, participants earned $435,000 for demonstrating zero-day in SharePoint,…

10 hours ago

New botnet HTTPBot targets gaming and tech industries with surgical attacks

New botnet HTTPBot is targeting China's gaming, tech, and education sectors, cybersecurity researchers warn. NSFOCUS …

11 hours ago

Meta plans to train AI on EU user data from May 27 without consent

Meta plans to train AI on EU user data from May 27 without consent; privacy…

20 hours ago

AI in the Cloud: The Rising Tide of Security and Privacy Risks

Over half of firms adopted AI in 2024, but cloud tools like Azure OpenAI raise…

22 hours ago

Google fixed a Chrome vulnerability that could lead to full account takeover

Google released emergency security updates to fix a Chrome vulnerability that could lead to full…

22 hours ago

Nova Scotia Power discloses data breach after March security incident

Nova Scotia Power confirmed a data breach involving the theft of sensitive customer data after…

1 day ago