FinalDraft Malware Uses Outlook Drafts for Covert C2 | Black Hat Ethical Hacking



Targeted Attacks Against a Government Ministry

A newly discovered malware named FinalDraft has been observed using Outlook email drafts as a command-and-control (C2) channel in attacks against a South American government ministry.

Researchers at Elastic Security Labs uncovered the malware, which operates as part of a sophisticated toolset that includes:

  • PathLoader: A custom malware loader
  • FinalDraft: A backdoor for data exfiltration and process injection
  • Post-exploitation tools: Used for credential theft and lateral movement

How the Attack Works

The attack begins when the threat actor compromises a system using PathLoader, which executes shellcode retrieved from an attacker-controlled server. This shellcode loads FinalDraft into memory.

Covert Communication via Outlook

Once executed, FinalDraft establishes communication with the attacker’s infrastructure using Microsoft Graph API by reading and writing to Outlook email drafts instead of sending messages. This technique enables:

  • Stealthy command execution: The malware receives commands hidden inside drafts (e.g., r_<session-id>)
  • Covert data exfiltration: Responses are stored in separate drafts (e.g., p_<session-id>)
  • Forensic evasion: Once executed, commands are deleted, making detection difficult

Additionally, FinalDraft retrieves an OAuth refresh token from its configuration and stores it in the Windows Registry, ensuring persistent access.

Token stored in the Windows Registry
Source: Elastic Security


Source link


Leave a Reply

Your email address will not be published. Required fields are marked *