By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
Tech News

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

By Viral Trending Content 5 Min Read
Share
SHARE

Mar 14, 2025Ravie LakshmananThreat Intelligence / Malware

OBSCURE#BAT Malware

A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called r77.

The activity, condemned OBSCURE#BAT by Securonix, enables threat actors to establish persistence and evade detection on compromised systems. It’s currently not known who is behind the campaign.

The rootkit “has the ability to cloak or mask any file, registry key or task beginning with a specific prefix,” security researchers Den Iuzvyk and Tim Peck said in a report shared with The Hacker News. “It has been targeting users by either masquerading as legitimate software downloads or via fake captcha social engineering scams.”

The campaign is designed to mainly target English-speaking individuals, particularly the United States, Canada, Germany, and the United Kingdom.

Cybersecurity

OBSCURE#BAT gets its name from the fact that the starting point of the attack is an obfuscated Windows batch script that, in turn, executes PowerShell commands to activate a multi-stage process that culminates in the deployment of the rootkit.

At least two different initial access routes have been identified to get users to execute the malicious batch scripts: One which uses the infamous ClickFix strategy by directing users to a fake Cloudflare CAPTCHA verification page and a second method that employs advertising the malware as legitimate tools like Tor Browser, VoIP software, and messaging clients.

While it’s not clear how users are lured to the booby-trapped software, it’s suspected to involve tried-and-tested approaches like malvertising or search engine optimization (SEO) poisoning.

Regardless of the method used, the first-stage payload is an archive containing the batch script, which then invokes PowerShell commands to drop additional scripts, make Windows Registry modifications, and set up scheduled tasks for persistence.

“The malware stores obfuscated scripts in the Windows Registry and ensures execution via scheduled tasks, allowing it to run stealthily in the background,” the researchers said. “Additionally, it modifies system registry keys to register a fake driver (ACPIx86.sys), further embedding itself into the system.”

OBSCURE#BAT Malware

Deployed over the course of the attack is a .NET payload that employs a bevy of tricks to evade detection. This includes control-flow obfuscation, string encryption, and using function names that mix Arabic, Chinese, and special characters.

Another payload loaded by means of PowerShell is an executable that makes use of Antimalware Scan Interface (AMSI) patching to bypass antivirus detections.

The .NET payload is ultimately responsible for dropping a system-mode rootkit named “ACPIx86.sys” into the “C:WindowsSystem32Drivers” folder, which is then launched as a service. Also delivered is a user-mode rootkit referred to as r77 for setting up persistence on the host and hiding files, processes, and registry keys matching the pattern ($nya-).

The malware further periodically monitors for clipboard activity and command history and saves them into hidden files for likely exfiltration.

Cybersecurity

“OBSCURE#BAT demonstrates a highly evasive attack chain, leveraging obfuscation, stealth techniques, and API hooking to persist on compromised systems while evading detection,” the researchers said.

“From the initial execution of the obfuscated batch script (install.bat) to the creation of scheduled tasks and registry-stored scripts, the malware ensures persistence even after reboots. By injecting into critical system processes like winlogon.exe, it manipulates process behavior to further complicate detection.”

The findings come as Cofense detailed a Microsoft Copilot spoofing campaign that utilizes phishing emails to take users to a fake landing page for the artificial intelligence (AI) assistant that’s engineered to harvest users’ credentials and two-factor authentication (2FA) codes.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

OnePlus 15 is Wake-up Call that Apple & Samsung Should Not Ignore

A Collision With Space Debris Leaves 3 Chinese Astronauts Stranded in Orbit

DoorDash email spoofing vulnerability sparks messy disclosure dispute

Keychain announcing new funding from top UK retailers and launches AI OS for retailers

Google SIMA 2 AI Self-Improvement AI, AGI Progress & Questions

TAGGED: Antivirus, Cyber Security, Cybersecurity, Data Exfiltration, Internet, Malware, phishing, powershell, rootkit, social engineering, Threat Intelligence, windows security
Share This Article
Facebook Twitter Copy Link
Previous Article Get Rich Quick In Avowed With Our Totally Legal Scheme
Next Article 7-Mile Border Wall Expansion Begins in Arizona
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Meghan Trainor Then & Now: Photos of the Singer’s Transformation
Celebrity
Indie games just made history at The Game Awards 2025
Gaming News
Resident Evil Requiem Demo Isn’t Currently Planned: “We Just Want to Finish The Game”
Gaming News
Aave introduces mobile savings app with 9% interest and insurance protection
Crypto
Is Saylor’s Bitcoin Strategy A ‘Fraud’? Schiff Wants A Live Debate To Prove It
Crypto
Workers turn to ‘polyworking’ to combat frozen salaries and inflation
Business
OnePlus 15 is Wake-up Call that Apple & Samsung Should Not Ignore
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Meghan Trainor Then & Now: Photos of the Singer’s Transformation

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Meghan Trainor Then & Now: Photos of the Singer’s Transformation
November 17, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?