Technical Analysis & Remediation
Threat Profile
Amaranth-Dragon
Origin/Attribution
Linked to Chinese state interests (APT-41 nexus); operates on UTC+8 (China Standard Time).
Objective
Cyber-espionage, geopolitical intelligence gathering.
Infrastructure
Geo-fenced C2s (Cloudflare) restricting access to specific target countries; Telegram-based C2 for RAT operations.
Vulnerability Vector
CVE-2025-8088
Type: Path Traversal / Arbitrary File Write.
Mechanism
Maliciously crafted RAR archives containing ".." sequences allow attackers to break out of the extraction path.
Exploitation
Used to drop persistence scripts (e.g., Windows Defender Definition Update.cmd) directly into the Windows Startup folder upon archive extraction.
Malware Arsenal & TTPs (MITRE ATT&CK)
Phishing (T1566)
Usage of lure documents/archives (e.g., "Salary Bonuses," "Falcon Strike 2025") hosted on legitimate services like Dropbox.
DLL Side-Loading (T1574.002)
Abuse of legitimate binaries (ZoomUpdate.exe, obs-browser-page.exe) to load malicious DLLs (DllSafeCheck64.dll, libcef.dll) from user-writable directories.
Impair Defenses: Disable or Modify Tools (T1562.001) The TGAmaranth RAT performs "unhooking" by spawning a suspended process, reading clean memory, and overwriting its own ntdll.dll to bypass EDR sensors.
Web Service (T1102) Command and Control (C2) traffic is routed through legitimate web services, specifically the Telegram API (for RAT commands) and Pastebin (for AES key retrieval).
Registry Run Keys / Startup Folder (T1547.001) Persistence is established by dropping scripts like Windows Defender Definition Update.cmd directly into the Windows Startup folder.
Live Evidence Extraction (Anchors)
Hardcoded RAR Password "S8jwaqfA0BBuWOAKrFLg" or "suu9cskRIQjsBxYtr9TH".
AES IV (Amaranth Loader)
12 34 56 78 90 AB CD EF 34 56 78 90 AB CD EF 12.
Persistence Script
"Windows Defender Definition Update.cmd".
Pastebin Actor
"amaranthbernadine".
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Network Block
Immediately block traffic to the identified C2 domains and the specific Pastebin account:
drive.easyboxsync[.]com
softwares.dailydownloads[.]net
www.todaynewsfetch[.]com
Endpoint Hunt
Query EDR/SIEM for the execution of ZoomUpdate.exe or obs-browser-page.exe originating from unusual locations like %APPDATA% or Public\Documents (legitimate instances usually run from Program Files).
Query (Sigma Logic)
Image NOT IN ("C:\Program Files*") AND Image ENDSWITH ("\ZoomUpdate.exe", "\obs-browser-page.exe").
Isolation
Isolate endpoints showing connections to Telegram API (api.telegram.org) if Telegram is not a sanctioned business application.
Phase 2: Eradication
Patching
Deploy the latest update for WinRAR (version > 7.01 or latest 2026 build) across the fleet to neutralize CVE-2025-8088.
File Removal
Remove the following persistence artifacts if found:
%APPDATA%\ZoomWorkspace\DllSafeCheck64.dll
C:\Users\Public\Documents\Microsoft\libcef.dll
Startup items
Windows Defender Definition Update.cmd
Registry Clean
Delete malicious Run keys referencing the dropped executables in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
Phase 3: Recovery
Credential Reset
Force password resets for users on affected machines, as TGAmaranth RAT has PII and credential theft capabilities.
Re-image
Due to the "memory-only" execution of the Havoc payload and sophisticated unhooking, reimaging is recommended for confirmed infected hosts.
Phase 4: Lessons Learned
Application Whitelisting
Implement AppLocker/WDAC to prevent the execution of unsigned scripts or DLLs from user-writable directories.
Geo-Blocking
Review web proxy logs for blocked 403 responses to known malicious domains; Amaranth-Dragon blocks non-target IPs, so a 403 might indicate an attempted (but geofenced) infection.
Remediation - THE HOME USER TRACK
Priority 1: Safety & Scanning
Disconnect
Immediately disconnect the device from the internet.
Update Software
Update WinRAR immediately. If you are unsure, uninstall it and use the built-in Windows zipper or 7-Zip (ensure it is also updated).
Check Startup
Open Task Manager (Ctrl+Shift+Esc), go to the Startup apps tab. Look for suspicious entries like Windows Defender Definition Update or scripts pointing to ZoomUpdate. Disable them.
Priority 2: Persistence Removal
Manual Check
Navigate to %APPDATA% (Type %appdata% in the file explorer bar).
Delete
Look for a folder named ZoomWorkspace. If it contains ZoomUpdate.exe and DllSafeCheck64.dll, delete the entire folder.
Note: Genuine Zoom installs are usually in AppData\Roaming\Zoom\bin.
Public Docs
Check C:\Users\Public\Documents\Microsoft. If you see obs-browser-page.exe or libcef.dll there, delete them.
Priority 3: Identity
Change Passwords
If you found any of the files above, consider your passwords compromised. Change them from a different, clean device.
Hardening & References
Baseline
CIS Benchmark for Windows 11/10 (Disable script execution in temp folders).
Reference
Check Point Research
Standard Vulnerability References (Contextual)
NVD (National Vulnerability Database)
CVE-2025-8088 (WinRAR Path Traversal)
MITRE ATT&CK
APT-41 (Group G0096)
Tooling
Use Sysinternals Autoruns to detect hidden persistence mechanisms that Task Manager might miss.