New technique's exploitation chain
The actual exploitation chain is detailed below and relies on a large number of resources, such as DOCX, RTF, HTA, VBScript, and PowerShell.
A victim receives a spam email with a DOCX file attachment.
Victim downloads and opens the DOCX file.
DOCX file contains an embedded OLE object.
OLE object downloads and opens an RTF (disguised as a DOC) file.
DOC file uses
CVE-2017-11882 Office Equation Editor vulnerability.
Exploit code runs an MSHTA command line.
MSHTA command line downloads and runs an HTA file.
HTA file contains a VBScript that unpacks a PowerShell script.
PowerShell script downloads and installs the password stealer.
Malware steals passwords from browsers, email and FTP clients.
Malware uploads data to a remote server.
....
........
..
............