Tech »  Topic »  UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware


UAC-0099 is a threat actor organization that has been targeting state officials, defense forces, and defense-industrial firms in a series of sophisticated cyberattacks that Ukraine’s CERT-UA has been investigating.

The attacks typically initiate with phishing emails from UKR.NET addresses, featuring subjects like “court summons” and links to legitimate file-sharing services, often shortened via URL shorteners.

These links lead to double-archived files containing malicious HTML Application (HTA) files.

Targeting Ukrainian Defense

Upon execution, the HTA files deploy obfuscated VBScript that creates temporary text files with HEX-encoded data and PowerShell code, alongside a scheduled task named “PdfOpenTask.”

This task executes the PowerShell script, which decodes the data into a .txt file, renames it to an executable like “AnimalUpdate.exe,” and sets up another scheduled task “\AnimalSoft\UpdateAnimalSoftware” to ensure persistence.

Example of an email and a decoy file

This chain deploys the MATCHBOIL loader, potentially replacing earlier variants like LONEPAGE ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE