{"id":1406,"date":"2025-12-05T17:46:46","date_gmt":"2025-12-05T17:46:46","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=1406"},"modified":"2025-12-05T17:46:46","modified_gmt":"2025-12-05T17:46:46","slug":"golden-boa-new-malware-operation-discovered-by-scilabs","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2025\/12\/05\/golden-boa-new-malware-operation-discovered-by-scilabs\/","title":{"rendered":"Golden Boa, new malware Operation discovered by SCILabs"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoaLogo2.png\" alt=\"\" \/><\/figure><\/div>\n\n\n<p>The following post aims to provide information on a new malware campaign, <em>Operation Golden Boa,<\/em> which was identified and named by SCILabs, and whose main objective is to distribute Remote Access Trojans (<a href=\"https:\/\/www.fortinet.com\/lat\/resources\/cyberglossary\/remote-access-trojan\" data-type=\"link\" data-id=\"https:\/\/www.fortinet.com\/lat\/resources\/cyberglossary\/remote-access-trojan\">RATs<\/a>). It was identified in early November 2025 through threat monitoring and hunting in Latin America; however, retrohunt analysis revealed that its activity has persisted from September to November of the same year.<\/p>\n\n\n\n<p>SCILabs identified that this operation is primarily targeting organizations in the hospitality and tourism sectors across Latin American countries, including Argentina, Colombia, and Brazil. The attackers impersonate organizations such as Aviatur and Booking.com, using phishing emails with the pretext of alleged reservations.<\/p>\n\n\n\n<p>One of the campaign&#8217;s distinguishing features is that, during the delivery phase, it exploits a recently discovered vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-8088\" data-type=\"link\" data-id=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-8088\">CVE-2025-8088<\/a>, which affects <a href=\"https:\/\/winrar.es\/\" data-type=\"link\" data-id=\"https:\/\/winrar.es\/\">WinRAR<\/a> and allows the execution of payloads using <a href=\"https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal\" data-type=\"link\" data-id=\"https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal\">path traversal<\/a>.<\/p>\n\n\n\n<p>The main objective of <em>Operation Golden Boa<\/em> is to distribute Remote Access Trojans (RATs) families such as <em><a href=\"https:\/\/www.trellix.com\/blogs\/research\/xworm-v6-exploring-pivotal-plugins\/\" data-type=\"link\" data-id=\"https:\/\/www.trellix.com\/blogs\/research\/xworm-v6-exploring-pivotal-plugins\/\">XWorm V6<\/a><\/em> and <em><a href=\"https:\/\/www.checkpoint.com\/es\/cyber-hub\/threat-prevention\/what-is-malware\/remcos-malware\/\" data-type=\"link\" data-id=\"ttps:\/\/www.checkpoint.com\/es\/cyber-hub\/threat-prevention\/what-is-malware\/remcos-malware\/\">Remcos<\/a><\/em>, whose primary purpose is to steal sensitive information of all kinds \u2014including credentials, browsing data, and stored files\u2014 as well as to enable remote control of infected computers.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">How can this affect an organization?<\/h1>\n\n\n\n<p>The malware variants distributed by <em>Operation Golden Boa<\/em> can steal confidential information (such as login credentials, files stored on the computer, browsing data, and more) from all types of users, including employees of public and private entities. They also allow remote control of infected computers, so if an attack is successful within an organization, cybercriminals can leak or sell the stolen information on clandestine Dark Web forums or the black market. Furthermore, they can enable remote code execution and the delivery of new artifacts, which could trigger more sophisticated attacks such as ransomware. This would jeopardize the confidentiality, integrity, and availability of organizational systems and information, resulting in financial losses and reputational damage to clients.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Threat context<\/h1>\n\n\n\n<p>In early November 2025, through threat monitoring in Latin America, SCILabs identified a phishing email that used a supposed credit card reservation as a pretext. Further investigation revealed additional emails leveraging tourism and travel-related themes, such as alleged accommodation lists, room reservations, and a supposed national tourism registry. These emails targeted accounts belonging to organizations in the hospitality and tourism sector.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa1a.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 1. First phishing email identified<\/figcaption><\/figure><\/div>\n\n\n<p>In this case, the email instructs the recipient to make a reservation using a card that is supposedly attached to a compressed file. This file corresponds to the dropper that initiates the attack flow.<\/p>\n\n\n\n<p>During the investigation, SCILabs determined that, as with the email analyzed in this document, the operation impersonates the organizations Aviantur and Booking.com, both dedicated to travel and accommodation bookings.<\/p>\n\n\n\n<p>It is important to note that some of the infrastructure used in this operation belongs to legitimate websites of organizations in the hospitality and tourism sector, primarily in Latin America, that were compromised. A detailed analysis of this infrastructure is provided later in this document. Therefore, we have a high level of confidence that the identified <em>Operation Golden Boa<\/em> is primarily aimed at affecting organizations in the hospitality and tourism sector in various Latin American countries, \u2014particularly in Colombia, Argentina, and Brazil\u2014 based on the recipients of the discovered phishing emails; however, it may also indirectly impact organizations that rely on these services.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Technical summary<\/h1>\n\n\n\n<p>The phishing email contains an attachment that appears to be a RAR compressed file.<\/p>\n\n\n\n<p>We analyzed this attachment and determined that it is indeed a RAR file appended to the end of a PDF file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa2.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 2. Code contained in the alleged compressed file<\/figcaption><\/figure><\/div>\n\n\n<p>This<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-now-use-zip-file-concatenation-to-evade-detection\/\" data-type=\"link\" data-id=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-now-use-zip-file-concatenation-to-evade-detection\/\"> file concatenation technique<\/a> is commonly used for malware distribution; however, using PDFs with compressed files is unusual. We hypothesize, with medium confidence, that this technique is intended to evade email filtering tools, as these tools often check file signatures to detect compressed files. It is important to note that the PDF itself does not contain malicious code and it is not used during the attack flow.<\/p>\n\n\n\n<p>Before the RAR file decompression begins, if the user opens it, a description titled <em>&#8220;Pol\u00edtica de seguridad y Observaciones&#8221;<\/em> related to the reservation is displayed, creating the appearance of a legitimate file. Additionally, it includes a shortcut file with a .<a href=\"https:\/\/fileinfo.com\/extension\/url\" data-type=\"link\" data-id=\"https:\/\/fileinfo.com\/extension\/url\">URL<\/a> extension.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa3a.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 3. Apparent contents of the compressed file<\/figcaption><\/figure><\/div>\n\n\n<p>The vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-8088\" data-type=\"link\" data-id=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-8088\">CVE-2025-8088<\/a> is exploited when the user extracts the malicious RAR file (it can also occur if the user directly executes the URL file within WinRAR, since the extraction occurs automatically in <em>%TEMP%<\/em>). This vulnerability is used to extract a hidden file from the RAR archive and store it in a location different from the extraction folder. Once the extraction occurs, the resulting URL file, in this case titled <em>\u201cTARJETA DE CREDITO SPINI, RENE LUIS ALE &#8211; DNI 12512437.001\u201d<\/em>, and a BAT file hidden within the RAR archive named \u201cWindowsDefender.Windows.security.Identity.protection.Windows.antivirus.BaT\u201d, are stored in the public access directory (<em>%PUBLIC%).<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa4a.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 4. Extraction paths<\/figcaption><\/figure><\/div>\n\n\n<p>The URL file contains junk HTML code; however, it also includes a direct link to the BAT file. Therefore, if the user executes the URL file, the BAT script will automatically run.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"261\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-28-172129-1024x261.png\" alt=\"\" class=\"wp-image-1469\" style=\"width:932px;height:auto\" srcset=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-28-172129-1024x261.png 1024w, https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-28-172129-300x77.png 300w, https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-28-172129-768x196.png 768w, https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-28-172129-1536x392.png 1536w, https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-28-172129.png 1583w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 5. URL file content<\/figcaption><\/figure><\/div>\n\n\n<p>Once the BAT file starts executing, the first stage of the infection begins.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>First stage of infection<\/strong><\/p>\n\n\n\n<p>The content of the BAT file is obfuscated by string substitution and the use of non-descriptive variables. This script has two objectives, outlined below.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa6.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 6. BAT file content<\/figcaption><\/figure><\/div>\n\n\n<p>1. The first objective is to open a link to an image stored on Google Drive. This image contains an alleged credit card from Credicoop bank in Argentina within the browser, serving as a distraction for the user. According to the email message, it is shared to make the supposed reservations.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa7a.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 7. Image of a supposed card displayed in the browser once the BAT file is executed<\/figcaption><\/figure><\/div>\n\n\n<p>2. The second objective is to download and execute an artifact hosted at the URL hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/xml[.]txt.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa8.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 8. Site content that is downloaded by the BAT file<\/figcaption><\/figure><\/div>\n\n\n<p>The downloaded website content appears to be a PDF file due to the visible text lines; however, these lines are commented (using the &#8220;#&#8221; character), meaning they are invalid and serve only as a distraction. In reality, the downloaded file is a PowerShell script, which is executed by the BAT file using the <a href=\"https:\/\/learn.microsoft.com\/en-us\/dotnet\/api\/system.diagnostics.processwindowstyle?view=net-9.0\" data-type=\"link\" data-id=\"https:\/\/learn.microsoft.com\/en-us\/dotnet\/api\/system.diagnostics.processwindowstyle?view=net-9.0\">&#8220;WindowStyle Hidden&#8221;<\/a> attribute to conceal the execution window and the <a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/module\/microsoft.powershell.core\/about\/about_execution_policies?view=powershell-7.5\" data-type=\"link\" data-id=\"ttps:\/\/learn.microsoft.com\/en-us\/powershell\/module\/microsoft.powershell.core\/about\/about_execution_policies?view=powershell-7.5\">&#8220;ExecutionPolicy Bypass&#8221;<\/a> attribute to bypass restrictions and warnings during execution.<\/p>\n\n\n\n<p>This PowerShell script is designed to execute embedded code, which is in binary format and subsequently decoded into readable <a href=\"https:\/\/elcodigoascii.com.ar\/\" data-type=\"link\" data-id=\"https:\/\/elcodigoascii.com.ar\/\">ASCII<\/a> text.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa9.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 9. PowerShell script obtained after being deobfuscated<\/figcaption><\/figure><\/div>\n\n\n<p>Once the binary string is decoded, it results in a second PowerShell script, which is also obfuscated using string substitution, <a href=\"\/\/developer.mozilla.org\/es\/docs\/Glossary\/Base64\">Base64<\/a> string encoding, string reversal, and the use of non-descriptive variables. This second script performs the tasks described below.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa10a.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 10. Second PowerShell script decoded<\/figcaption><\/figure><\/div>\n\n\n<p>1. It downloads an artifact from an archive[.]org storage site (hxxp[:]\/\/ia801007[.]us[.]archive[.]org\/15\/items\/optimized_msi_20251009_2311\/optimized_MSI[.]png). This is an image with embedded code using <a href=\"https:\/\/latam.kaspersky.com\/resource-center\/definitions\/what-is-steganography\">steganography<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa11.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 11. Image with embedded code using steganography<\/figcaption><\/figure><\/div>\n\n\n<p>2. It obtains the embedded code, decodes it from Base64, and converts it into an executable file which corresponds to a generic loader commonly used to execute malware from various <em>XWorm, <a href=\"https:\/\/www.checkpoint.com\/es\/cyber-hub\/threat-prevention\/what-is-malware\/asyncrat-malware-explained\/\">AsyncRAT<\/a><\/em> and <em><a href=\"https:\/\/www.checkpoint.com\/es\/cyber-hub\/threat-prevention\/what-is-malware\/what-is-njrat-malware\/\">NjRAT<\/a><\/em> campaigns, among others.<\/p>\n\n\n\n<p>3. The script also decodes a reversed Base64 string and obtains the URL hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/image[.]txt, from which it downloads its content, also encoded in Base64 and reversed.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa12.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 12. Encoded content of the site<\/figcaption><\/figure><\/div>\n\n\n<p>4. The content retrieved in the previous step is loaded by the generic loader into a legitimate process called <a href=\"https:\/\/learn.microsoft.com\/es-es\/dotnet\/framework\/tools\/caspol-exe-code-access-security-policy-tool\">caspol.exe<\/a>, executing a payload corresponding to the <em><a href=\"https:\/\/www.picussecurity.com\/resource\/blog\/xworm-rises-again-dissecting-the-modular-malwares-v6-resurrection\">XWorm V6<\/a><\/em> malware. This version, identified in 2025, is known for its ability to receive and deploy new <a href=\"https:\/\/www.ionos.mx\/digitalguide\/servidores\/know-how\/que-es-un-plugin\/\">plugins<\/a> that allows it to perform various tasks on the infected machine. Some of these plugins could be:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plugins to generate new connection channels (opening ports, initiating sessions via <a href=\"https:\/\/learn.microsoft.com\/es-es\/troubleshoot\/windows-server\/remote\/understanding-remote-desktop-protocol\">RDP<\/a> protocol).<\/li>\n\n\n\n<li>Plugins for data collection (stealing victim account data, obtaining operating system information, enumerating active connections, accessing the machine&#8217;s camera, stealing browser data).<\/li>\n\n\n\n<li>Plugins for remote execution (command execution, delivery of new payloads).<\/li>\n\n\n\n<li>Plugins for creating persistence (creating registry entries for script execution), among <a href=\"https:\/\/www.trellix.com\/blogs\/research\/xworm-v6-exploring-pivotal-plugins\/\">others<\/a>.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa13.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 13. <em>XWormV6<\/em> sample code segment<\/figcaption><\/figure><\/div>\n\n\n<p>At this point, the computer is already infected with the malware, which, in turn, establishes persistence by creating a registry entry in \u201c<em>HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run<\/em>\u201d or through the persistence plugin implemented by <em>XWorm V6<\/em>. Furthermore, monitoring and data theft from the infected computer begins. Additionally, the infection continues into a second stage.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Second stage of the infection<\/strong><\/p>\n\n\n\n<p>The second PowerShell script contains two commands that create two scheduled tasks. These tasks are configured with specific names and different URLs, both following the structure shown below.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa14.png\" alt=\"\" \/><\/figure><\/div>\n\n\n<p>These commands configure the two tasks to run only once, immediately after their creation, each with a 200-minute repetition interval (based on the parameters defined in <a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/module\/scheduledtasks\/new-scheduledtask\">\u201cNew-ScheduledTaskTrigger\u201d<\/a>). The associated action involves downloading content from a remote site and executing it via PowerShell, while hiding the process window and using the \u201c-ExecutionPolicy bypass\u201d parameter to avoid blocks or alerts during execution.<\/p>\n\n\n\n<p>One of the tasks uses the name &#8220;OneDrive.Reporting.Task-S-1-5-21-3696370798-3087087698-4033434390-1022&#8221;, which downloads and executes code from the URL hxxps[:]\/\/banucha[.]com[.]br\/images\/icon32[.]txt. However, during the analysis, this site was unavailable, and no historical records of its content were identified, leaving uncertainty about the purpose of this task when executed.<\/p>\n\n\n\n<p>On the other hand, the scheduled task named \u201cOneDrive.Reporting.Task-S-1-5-21-3696370797-3087087698-4033434390-1011\u201d downloads and executes code from the URL hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/wp-load[.]txt. This contains code using the technique mentioned earlier, where it seems like a PDF file. However, this corresponds to a third PowerShell script with an obfuscated string in binary format that is processed to obtain a fourth PowerShell script.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa15a.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 14. Fourth PowerShell script obtained from the binary code string<\/figcaption><\/figure><\/div>\n\n\n<p>The functions of the fourth PowerShell script are described below.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Delete all contents of the <em>%PUBLIC%<\/em> directory to remove evidence.<\/li>\n\n\n\n<li>Download the generic loader used in the first stage of the infection again, obtained from the same URL hosting the image on archive[.]org, where the code is embedded using steganography.<\/li>\n\n\n\n<li>Decode a string present in the code \u2014which is Base64 encoded and reversed\u2014 to reconstruct the URL hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/xnl[.]txt. From this URL, it downloads a file whose content is again Base64 encoded and obtains a payload; this corresponds to <em>Remcos<\/em> malware.<\/li>\n\n\n\n<li>The loader injects the <em>Remcos<\/em> payload into the caspol.exe process, which remains running to monitor the computer and exfiltrate data, while the fourth script continues its subsequent actions.<\/li>\n\n\n\n<li>The fourth script downloads several additional artifacts from the following URLs and temporarily stores them in the <em>%PUBLIC%<\/em> directory:\n<ul class=\"wp-block-list\">\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-xx[.]txt<\/li>\n\n\n\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-type[.]txt<\/li>\n\n\n\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-runpe[.]txt<\/li>\n\n\n\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-msg[.]txt<\/li>\n\n\n\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-method[.]txt<\/li>\n\n\n\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-load[.]txt<\/li>\n\n\n\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-invoke[.]txt<\/li>\n\n\n\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-Framework[.]txt<\/li>\n\n\n\n<li>hxxps[:]\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-Execute[.]txt<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Third stage of infection<\/strong><\/p>\n\n\n\n<p>The downloaded artifacts contain, in some cases, plain text strings, and in others, obfuscated strings using character substitution, encoded in Base64 or in binary format. Consequently, several lines of code in the fourth PowerShell script are dedicated to decoding these strings.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa16.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 15. Content displayed by the files stored in the mentioned URLs<\/figcaption><\/figure><\/div>\n\n\n<p>Once the strings are decoded, they are concatenated to assemble and execute the following PowerShell command.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa17.png\" alt=\"\" \/><\/figure><\/div>\n\n\n<p>Where the parameter <em>[LOADER]<\/em> contains the result of decoding the file \u201cIMG-runpe.txt\u201d, which corresponds to the same generic loader used in previous stages of the infection. Meanwhile, <em>[PAYLOAD]<\/em> contains the result of decoding the file \u201cIMG-msg.txt\u201d, corresponding to another sample of the <em>XWorm V6<\/em> malware, with a different hash value compared with the sample found in the first stage. Finally, the loader loads the malware into the legitimate caspol.exe process and initiates its malicious activities.<\/p>\n\n\n\n<p>At this point, the computer is running the caspol.exe process infected with at least three different malware samples: two <em>XWorm V6<\/em> and one <em>Remcos<\/em> sample. Each of these samples has its own persistence and is contacting different command and control servers, which are listed below.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Command and control server domains<\/strong><strong><\/strong><\/td><\/tr><tr><td>office-monitor[.]accesscam[.]org<\/td><\/tr><tr><td>banucha01[.]accesscam[.]org<\/td><\/tr><tr><td>banucha02[.]accesscam[.]org<\/td><\/tr><tr><td>microsoft-graphics[.]ddns[.]net<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Table 1. Command-and-control servers identified during the infection<\/figcaption><\/figure>\n\n\n\n<p>Based on this information, SCILabs has a high level of confidence in the hypothesis that infecting the device with different payloads is necessary to maintain greater control over the infected device, increasing the effectiveness of the infection and enhancing the ability to sustain a stable connection and achieve greater persistence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Infrastructure analysis<\/h2>\n\n\n\n<p>During the analysis, SCILabs noticed the use of different sites, with two purposes: to download artifacts and establish command and control. The findings of the investigation carried out on these sites will be described below.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Legitimate infrastructure compromised<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>www[.]hermitagehotel[.]com[.]ar<\/li>\n<\/ul>\n\n\n\n<p>Most of the artifacts obtained during the attack flow were downloaded from the website with the domain www[.]hermitagehotel[.]com[.]ar. Upon the corresponding investigation, the following results were obtained:<\/p>\n\n\n\n<p>This is a legitimate website belonging to the Hermitage Hotel in Mar del Plata, Argentina, and all its visible, legitimate content focuses on the services they provide, their history, reservations, etc.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa18.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 16. Content found in the site hermitagehotel[.]com[.]ar<\/figcaption><\/figure><\/div>\n\n\n<p>Their records indicate that it was created in August 2000. Based on this information and the site&#8217;s content, we can conclude that it is a legitimate site that could have been compromised by the operators to distribute malware.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa19.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\"><strong>Figura 17. Domain registration information of hermitagehotel[.]com[.]ar<\/strong><\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>wyndhamgardencartagena[.]com<\/li>\n<\/ul>\n\n\n\n<p>This site was identified through retrohunt processes conducted during the analysis. It was part of the infrastructure used in the operation to download various artifacts, but in previous infections.<\/p>\n\n\n\n<p>This domain belongs to a legitimate Wyndham Garden Hotel website in Cartagena, Colombia, and all the site&#8217;s content is related to its services.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa20.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 18. Content found on the site wyndhamgardencartagena[.]com<\/figcaption><\/figure><\/div>\n\n\n<p>In this case, according to the domain records, it was created in May 2019. Based on this information and the site&#8217;s content, we can conclude that it is a legitimate site that could have been compromised by the malware operators.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa21.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 19. Domain registration information of wyndhamgardencartagena[.]com<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>huskissonhotel[.]com[.]au<\/li>\n<\/ul>\n\n\n\n<p>Another artifact download site identified as part of the infrastructure used in this operation corresponds to the website of a hotel \u2014Huskisson Hotel, located in Australia\u2014 whose visible content is related to its legitimate services.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa22.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 20. Content found on the site huskissonhotel[.]com[.]au<\/figcaption><\/figure><\/div>\n\n\n<p>In this case, the domain creation date is hidden; however, the last update date was September 2024. Based on this information and the site&#8217;s content, we can conclude that it is a legitimate site that could have been compromised by the operators.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa23.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 21. Domain registration information of huskissonhotel[.]com[.]au<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>karriere[.]gut-kump[.]de<\/li>\n<\/ul>\n\n\n\n<p>This site was also found through retrohunt and is used to download artifacts used in this operation. In this case, the domain gut-kump[.]de belongs to the Gut Kump Hotel website in Germany, and all visible content is related to its services.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa24.png\" alt=\"\" style=\"width:817px;height:auto\" \/><figcaption class=\"wp-element-caption\">Figure 22. Content found on the site gut-kump[.]de<\/figcaption><\/figure><\/div>\n\n\n<p>As with the previous domain, the domain creation date is hidden; however, the last update date was December 2020. Based on this information and the site&#8217;s content, we can conclude that it is a legitimate site that could have been compromised by the operators.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa25.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 23. Domain registration information of gut-kump[.]de<\/figcaption><\/figure><\/div>\n\n\n<p class=\"has-medium-font-size\"><strong>Malicious infrastructure<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>aviatur-hoteles[.]com<\/li>\n<\/ul>\n\n\n\n<p>During the analysis of the phishing email, the sender email address is juan[.]hernandez[@]aviatur-hoteles[.]com.<\/p>\n\n\n\n<p>Analyzing the domain records for aviatur-hoteles[.]com, we observed that it was created in September 2025. Furthermore, its website has no content. Additionally, the Aviatur group shows no connection to this domain on any of its official websites.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa26.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 24. Domain registration information of aviatur-hoteles[.]com<\/figcaption><\/figure><\/div>\n\n\n<p>Based on the information gathered and SCILabs\u2019 experience analyzing multiple malware campaigns, we have a high level of confidence that this domain was created exclusively for use in this operation.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>banucha[.]com[.]br<\/li>\n<\/ul>\n\n\n\n<p>The possible download of an artifact was identified during the attack flow, which was allegedly carried out from this site. Therefore, an investigation was conducted, yielding the following results:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>No records were found related to the host, domain, or its status.<\/li>\n\n\n\n<li>No historical information was identified, indicating that the domain had been previously registered or used.<\/li>\n\n\n\n<li>Consequently, we determined with a medium level of confidence that the domain could be created to distribute malware.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Command-and-control server domains<\/strong><\/p>\n\n\n\n<p>From the list of command-and-control servers used by the final malware, <em>XWorm v6<\/em> and <em>Remcos<\/em>, we observed that all of them are dynamic domain names (<a href=\"https:\/\/www.fortinet.com\/lat\/resources\/cyberglossary\/dynamic-dns\">DDNS<\/a>).<\/p>\n\n\n\n<p>First, domains belonging to <a href=\"https:\/\/parked.dynu.com\/Parked.html?domainname=www.accesscam.org\">accesscam[.]org<\/a> were identified, which are associated with the service provider <a href=\"https:\/\/www.dynu.com\/\">Dynu<\/a>. This service allows the creation of dynamic domains from a series of predefined domains.<\/p>\n\n\n\n<p>In this case, the operators added subdomains such as \u201cbanucha01\u201d and \u201cbanucha02\u201d, whose meaning is unknown, as well as \u201coffice-monitor\u201d, which is used to simulate a legitimate Microsoft Office service and attempt to remain undetected.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>office-monitor[.]accesscam[.]org<\/li>\n\n\n\n<li>banucha01[.]accesscam[.]org<\/li>\n\n\n\n<li>banucha02[.]accesscam[.]org<\/li>\n<\/ul>\n\n\n\n<p>On the other hand, a command-and-control server was identified whose domain uses the ddns[.]net extension, corresponding to the provider <a href=\"https:\/\/www.noip.com\/\">No-IP<\/a>. This service also allows the creation of custom subdomains, and in this case, the attackers chose \u201cmicrosoft-graphic,\u201d with the intent of impersonating a legitimate Microsoft Office service.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>microsoft-graphics[.]ddns[.]net<\/li>\n<\/ul>\n\n\n\n<p>The use of dynamic domains is a common practice in malware campaigns, as it facilitates anonymity and infrastructure rotation. Therefore, we have a high level of confidence that these domains were created exclusively for this malicious operation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">CVE-2025-8088 vulnerability exploitation<\/h2>\n\n\n\n<p>This vulnerability, discovered by researchers at the security firm ESET in July of this year, is being exploited by the <em><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/actor\/romcom\">RomCom<\/a><\/em> threat group. It is a <a href=\"https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal\">path traversal<\/a> vulnerability with a high CVSS 4.0 severity level of 8.4, which allows attackers to execute arbitrary code by creating malicious compressed files. It affects WinRAR versions on Windows before version 7.13. It is important to note that other threat actors, such as <em><a href=\"https:\/\/bi-zone.medium.com\/paper-werewolf-targets-russia-with-winrar-zero-day-vulnerability-0cfdabac8c84\">Paper Werewolf<\/a><\/em>, are currently exploiting this vulnerability; however, there is no evidence of any attempts to exploit it in Latin America by other threat groups besides the <em>Golden Boa<\/em> operators.<\/p>\n\n\n\n<p>Exploiting this vulnerability begins with creating a specially crafted compressed file. This file may contain visible files but also includes hidden files that use <a href=\"https:\/\/learn.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-fscc\/c54dec26-1551-4d3a-a0ea-4fa40f848eb3\">NTFS ADS<\/a> (Alternative Data Streams). The purpose of the ADS is to associate potentially confidential files or information with other files, thus hiding them from certain users and preventing them from being visible to applications (in this case, WinRAR).<\/p>\n\n\n\n<p>For the artifacts analyzed in this document, the ADS are created using the URL file \u201c<em>TARJETA DE CREDITO SPINI, RENE LUIS ALE &#8211; D.N.I. 12512437.001<\/em>\u201d, which is used as the main data stream. Alternative data streams are generated by adding the file \u201cWindowsDefender.Windows.security.Identity.protection. Windows.antivirus.BaT\u201d, maintaining the following structure:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"565\" height=\"47\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-27-142001.png\" alt=\"\" class=\"wp-image-1475\" style=\"width:607px;height:auto\" srcset=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-27-142001.png 565w, https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-27-142001-300x25.png 300w\" sizes=\"auto, (max-width: 565px) 100vw, 565px\" \/><\/figure><\/div>\n\n\n<p>Additionally, the alternative data flow is expressed using the path traversal, adding the string \u201c..\\\u201d to allow going up one level within the path in the file system.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"705\" height=\"46\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-27-142028.png\" alt=\"\" class=\"wp-image-1476\" style=\"width:777px;height:auto\" srcset=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-27-142028.png 705w, https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/Captura-de-pantalla-2025-11-27-142028-300x20.png 300w\" sizes=\"auto, (max-width: 705px) 100vw, 705px\" \/><\/figure><\/div>\n\n\n<p>As a result, if the contents of the RAR file are extracted to the current path, the BAT file will be extracted to a different location.<\/p>\n\n\n\n<p>For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Original extraction path<\/strong>: <em>C:\\Users\\%User%\\Downloads\\<\/em><\/li>\n\n\n\n<li><strong>BAT file extraction path<\/strong>: <em>C:\\Users\\% User %\\Downloads\\[URL file]:..\\..\\..\\..\\..\\Users\\Public<\/em><\/li>\n<\/ul>\n\n\n\n<p>Because of this, errors related to the extraction of hidden files using ADS may occur during the extraction process. If the path within the computer&#8217;s file system cannot be identified or does not exist, that hidden file is skipped, and the process continues with the next one. In this case, you might see four failed attempts; however, this depends on the extraction directory.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa27a.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 25. Errors during decompression that show the extraction path attempts of the BAT file<\/figcaption><\/figure><\/div>\n\n\n<p>During the investigation of <em>Operation Golden Boa<\/em>, RAR files specifically designed with at least ten ADSs were identified, ensuring the extraction of the BAT file with a higher probability.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Attack flow summary<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The victim receives a phishing email under the pretext of a supposed reservation. This email contains an attached RAR compressed file.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If the user extracts the compressed file, a URL file is obtained, and exploiting the CVE-2025-8088 vulnerability, a BAT script is extracted in <em>%PUBLIC% directory.<\/em><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If the user executes the URL file, it automatically initiates the execution of the BAT script, which downloads and executes content from the operator&#8217;s infrastructure. It also displays an image of a purported Credicoop bank card in the browser.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The content executed by the BAT file is a PowerShell script that runs a second, embedded, and hardcoded PowerShell script.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The second script downloads a payload corresponding <em>to XWorm V6<\/em> to infect the computer and a generic loader to initiate its loading into the caspol.exe process.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The second PowerShell script also executes a scheduled task that downloads more content from the operators&#8217; infrastructure; this is a third PowerShell script.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The third PowerShell script contains a fourth PowerShell script that, again, initiates the download of the generic loader and a payload corresponding to <em>Remcos<\/em>, starting its execution in the caspol.exe process.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The fourth PowerShell script initiates the download and decoding of more artifacts, which generates a command that is then executed.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This command downloads again the generic loader and executes embedded content corresponding to a second sample of <em>XWorm V6<\/em> in the caspol.exe process.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>At this point, the machine is infected with three different malware samples (two of <em>XWorm V6<\/em> and one of <em>Remcos<\/em>), each establishing its own persistence and communicating with its C2 server to perform its malicious activities.<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">Attack flow diagram<\/h1>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa28.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Figure 26. Flowchart of the attack observed in the <em>Operation Golden Boa<\/em><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">TTPs observed aligned to the MITRE ATT&amp;CK\u00ae framework<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/3\/2025\/12\/GoldenBoa29.png\" alt=\"\" \/><figcaption class=\"wp-element-caption\">Table 2. TTPs observed aligned to the MITRE ATT&amp;CK\u00ae framework<\/figcaption><\/figure><\/div>\n\n\n<h1 class=\"wp-block-heading\">CONCLUSION<\/h1>\n\n\n\n<p><em>Operation Golden Boa<\/em> exemplifies a targeted threat, specifically designed to affect organizations in a particular sector\u2014in this case, the hospitality and tourism industry. However, the techniques implemented to enhance its effectiveness, as well as the attack artifacts and flow, can be repurposed against any type of user. This suggests that the operators behind the campaign, if successful, could replicate the same strategy to target different sectors in the region. Likewise, other threat actors may adopt these same methods, particularly by exploiting the recently discovered vulnerability CVE-2025-8088, which could become more prevalent in the coming months.<\/p>\n\n\n\n<p>On the other hand, while <a href=\"https:\/\/www.welivesecurity.com\/la-es\/2023\/05\/22\/commodity-malware-uso-ataques-dirigidos-blancos-america-latina\/\">commodity malware<\/a> threats such as <em>Remcos<\/em> or <em>XWorm<\/em> are commonly used in the region \u2014particularly by groups like <em><a href=\"https:\/\/blog.scilabs.mx\/malware-campaign-attributed-to-apt-c-36-context-and-iocs-update-june-2022\/\">APT-C-36<\/a><\/em> or <em><a href=\"https:\/\/blog.scilabs.mx\/threat-profile-red-akodon-un-nuevo-actor-de-amenazas-distribuyendo-rats-dirigidos-a-colombia\/\">Red Akodon<\/a><\/em><a href=\"#_ftn3\" id=\"_ftnref3\"> <\/a>\u2014 the emergence of newer variants, such as <em>XWorm V6<\/em>, could represent a growing trend and a more serious threat due to their increased capabilities, enabling more sophisticated attacks like ransomware.<\/p>\n\n\n\n<p>Finally, it is important to highlight that the operators of this campaign employ multiple evasion techniques against advanced security mechanisms, including encryption, encoding, camouflage, and the use of compromised legitimate infrastructure from various organizations. These characteristics make <em>Operation Golden Boa<\/em> a highly evasive and difficult-to-detect threat.<\/p>\n\n\n\n<p>For these reasons, SCILabs believes it is important for institutions and companies to stay informed about updates to pretexts and TTPs to minimize the risk of infection and the impact that the theft of confidential information can have on organizations.<\/p>\n\n\n\n<p>SCILabs makes the following recommendations:<\/p>\n\n\n\n<p><strong>General recommendations for <em>Operation Golden Boa<\/em>.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Block the Indicators of Compromise (IoCs) provided in this report.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct awareness campaigns about the social engineering techniques used by cybercriminals to distribute malware, such as phishing emails using pretexts related to reservations and tourism activities.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct threat hunting for suspicious PowerShell processes, also related to BAT or VBS files, that execute obfuscated commands.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct threat hunting to identify suspicious caspol.exe processes that are not part of the operation.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct threat hunting for suspicious files within <em>%PUBLIC%,<\/em> primarily those with BAT, TXT, VBS, and PNG extensions, as well as other files without extensions.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct threat hunting for the creation of scheduled tasks with suspicious names that may contain strings like &#8220;OneDrive&#8221;.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting for PowerShell processes that execute with the <a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/module\/microsoft.powershell.utility\/invoke-webrequest?view=powershell-7.5\">&#8220;Invoke-WebRequest&#8221;<\/a> parameter, which <em>Operation Golden Boa<\/em> uses in its PowerShell scripts to download the different stages of its infection. For example, some useful events for this task might be the process creation<a href=\"https:\/\/research.splunk.com\/sources\/b375f4d1-d7ca-4bc0-9103-294825c0af17\/\"> event ID 1<\/a>, from Sysmon events and <a href=\"https:\/\/research.splunk.com\/sources\/5cfd0c72-d989-47a0-92f9-6edc6f8d3564\/\">event ID 4104<\/a> for PowerShell scripting block content searching for suspicious commands.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Raise awareness among users about the risks of storing login credentials in their web browsers.<\/li>\n<\/ul>\n\n\n\n<p><strong>Recommendations for vulnerability CVE-2025-8088.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If using WinRAR on Windows, update to a more recent version, starting with version 7.13.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check for errors during file decompression where the filename, directory name, or syntax is incorrect. Look for potential path traversal exploits using the string \u201c..\\\u201d.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting by searching for suspicious files in common paths such as <em>%PUBLIC%, %TEMP%, %STARTUP%, %USERPROFILE%<\/em>, and others.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Raise user awareness about the use of applications like WinRAR for file compression and decompression, and their vulnerability.<\/li>\n<\/ul>\n\n\n\n<p><strong>Recommendations for <em>XWorm V6<\/em> and <em>Remcos<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrate security policies at all levels of the organization, including the use of high-quality antivirus or EDR software, keeping it constantly updated to ensure it always has the latest signatures released by manufacturers, thus significantly reducing the chances of infection.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement proper policies for creating and using passwords so they are not easily guessed or included in dictionaries used by attackers.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid storing login credentials in web browsers.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If they are not essential for the organization&#8217;s operations, block free DDNS services such as no-ip, chickenkiller[.]com, linkpc[.]net, duckdns[.]org, and ddns[.]net, and evaluate the impact of doing so.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Evaluate whether it is possible to block domains such as pastebin[.]com, wtools[.]io, paste[.]dev, and other paste sites.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Restrict the use of <a href=\"https:\/\/lolbas-project.github.io\/\">LOLBAS<\/a>, allowing <a href=\"https:\/\/www.mcafee.com\/learn\/what-is-mshta-how-can-it-be-used-and-how-to-protect-against-it\/\">mshta<\/a>, <a href=\"https:\/\/learn.microsoft.com\/es-es\/windows-server\/administration\/windows-commands\/wscript\">wscript<\/a>\/<a href=\"https:\/\/learn.microsoft.com\/es-es\/windows-server\/administration\/windows-commands\/cscript\">cscript<\/a>, <a href=\"https:\/\/learn.microsoft.com\/es-es\/windows-server\/administration\/windows-commands\/regsvr32\">regsvr32<\/a>, and <a href=\"https:\/\/learn.microsoft.com\/es-es\/windows-server\/administration\/windows-commands\/rundll32\">rundll32<\/a> in the permissions list only where necessary, and alert if they make web connections.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting to identify suspicious RegSvcs.exe processes that are not part of the operation.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Block and alert on unauthorized installations of <a href=\"https:\/\/aws.amazon.com\/es\/what-is\/remote-monitoring-and-management\/\">RMM<\/a> software.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Restrict the use of <a href=\"https:\/\/learn.microsoft.com\/es-es\/troubleshoot\/windows-server\/remote\/understanding-remote-desktop-protocol\">RDP<\/a>, <a href=\"https:\/\/learn.microsoft.com\/es-es\/windows\/win32\/fileio\/microsoft-smb-protocol-and-cifs-protocol-overview\">SMB<\/a>, <a href=\"https:\/\/learn.microsoft.com\/es-es\/windows\/win32\/wmisdk\/wmi-start-page\">WMI<\/a>, and <a href=\"https:\/\/learn.microsoft.com\/es-es\/windows\/win32\/winrm\/portal\">WinRM<\/a>, allowing them only if they are part of the operation and limiting network segments.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting on network traffic, looking for suspicious connections to Telegram or Signal.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Investigate for suspicious registry entries in the following paths:<ul><li><em>HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run<\/em><\/li><\/ul><ul><li><em>HKEY_CURRENT_USER\\SOFTWARE\\&lt;ID OF INFECTED CLIENT&gt;<\/em><\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li><em>HKEY_CURRENT_USER\\SOFTWARE\\VB and VBA Program Settings\\C\\0<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting by looking for the creation of suspicious directories and files in the following paths:<ul><li><em>C:\\Recovery\\OEM<\/em><\/li><\/ul><ul><li><em>%APPDATA%\\Microsoft\\CLR<\/em><\/li><\/ul><ul><li><em>%TEMP%<\/em><\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li><em>%TEMP%\\XRecovery\\Browsers<\/em><\/li>\n\n\n\n<li><em>%USERPROFILE%<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">INDICATORS OF COMPROMISE<\/h2>\n\n\n\n<p><strong>Hash SHA256<\/strong><strong><\/strong><\/p>\n\n\n\n<p>41F6E082F047BD53745AD720FA30BA3F58CA5F0AEBDD4782BC92693528AC2288<br>492C88BF4C795B401E3676DCDC25EAB057174577111089A0F9440120B9CC83F0<br>2AEB4935B5997AC5E7118B278AE80DB34C4DD214B9FAC25BA0A7C20256FB7B4C<br>D10EB906A1EFD1AEDE3F82AA1B06D257AA07AE4B42DCFDDFD50311A470E286E8<br>6B9DE2CC865417853E5FD33953EA627DC58489333AD1B2B8154F1C8B7E64954E<br>D64D78D833E9FDF3BEC602FCE49BCEFABE7B2E8D26AB5276CEB7C5DED5FB097E<br>A550A06A66009040462411867FCE966B24499290D08BAC8B3596F715CD5C6596<br>406A193C0819121A2AA1D9F95813D1C29194A0EEC62E9AA3E649885A3CA60D53<br>8D32D4E05830F5CABF182A5C33DD445E67E4FF87E59FD7554B2CC23D892CFEB7<br>0B3A61B33AF8621110D48AF3BBD7F4FD52F4C11839529835557D51994B326AC8<br>4511004DF7037825B1E03EF030614B845F865C8EAEBF85D3AC2A24884BF1AE81<br>2AEB4935B5997AC5E7118B278AE80DB34C4DD214B9FAC25BA0A7C20256FB7B4C<br>B19087E41B2E419E93B72E98CCA2B21C741A879B98EAAA86B0001F9A921C5CFE<br>A648FCB593435C0DEFB78216FE2DB2184FA55466E2B1CD7A79D5EE84AE53CBD2<br>ECF1987D11BFAB327938DC50E9430B7A19558DE5426DE9E96F9F024F96079BBF<br>D58556325550534AC561D3B7048B118F07DEDD8F216824F3AEFE0A73C88192BB<br>D4B7815F9B204ACD54F87DA6CAD0A5657E865E366572D5DA0815DD72BE2B1BA1<br>05E2223F0995CB47881687713DCC5038109A653C0925BF05996EED87102478FD<\/p>\n\n\n\n<p><strong>URLs of download sites<\/strong><\/p>\n\n\n\n<p>***You must block the entire URL, otherwise, the organization&#8217;s operations could be affected, or future false positives could occur.***&nbsp;<\/p>\n\n\n\n<p>hxxp:\/\/ia801007[.]us[.]archive[.]org\/15\/items\/optimized_msi_20251009_2311\/optimized_MSI[.]png<br>hxxps:\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/plano[.]pdf<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/image[.]txt<br>hxxps:\/\/banucha[.]com[.]br\/images\/icon32[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/xnl[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/xml[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-xx[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-type[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-runpe[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-msg[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-method[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-invoke[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-Framework[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/2012\/img_dg\/slide_servicios\/IMG-Execute[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/license[.]pdf<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/xml[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/xnl[.]txt<br>hxxps:\/\/www[.]hermitagehotel[.]com[.]ar\/carta\/1[.]txthxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/contador[.]html<br>hxxps[:]\/\/ia601001[.]us[.]archive[.]org\/26\/items\/optimized_msi_20250915\/optimized_MSI[.]png<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/aviatur[.]html<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/agencia[.]html<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/Booking[.]html<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/platilha[.]pdf<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/plano[.]pdf<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/contador[.]html<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/cruzeiro[.]html<br>hxxp[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/08\/balde[.]txt<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/r[.]pdf<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/b[.]txt<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/07<br>hxxps[:]\/\/karriere[.]gut-kump[.]de\/wp-content\/uploads\/2025\/10\/Cardapio[.]pdf<br>hxxps[:]\/\/karriere[.]gut-kump[.]de\/wp-content\/uploads\/2025\/10\/outline[.]pdf<br>hxxps[:]\/\/karriere[.]gut-kump[.]de\/wp-content\/uploads\/2025\/10\/Cardapio[.]pdf<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/contador[.]html<br>hxxps[:]\/\/ia601001[.]us[.]archive[.]org\/26\/items\/optimized_msi_20250915\/optimized_MSI[.]png<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/aviatur[.]html<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/agencia[.]html<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/Booking[.]html<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/platilha[.]pdf<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/plano[.]pdf<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/contador[.]html<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/cruzeiro[.]html<br>hxxp[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/08\/balde[.]txt<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/r[.]pdf<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/09\/b[.]txt<br>hxxps[:]\/\/huskissonhotel[.]com[.]au\/wp-content\/uploads\/2025\/07<br>hxxps[:]\/\/karriere[.]gut-kump[.]de\/wp-content\/uploads\/2025\/10\/Cardapio[.]pdf<br>hxxps[:]\/\/karriere[.]gut-kump[.]de\/wp-content\/uploads\/2025\/10\/outline[.]pdf<br>hxxps[:]\/\/karriere[.]gut-kump[.]de\/wp-content\/uploads\/2025\/10\/Cardapio[.]pdf<\/p>\n\n\n\n<p><strong>Sending mail server domain<\/strong><\/p>\n\n\n\n<p>aviatur-hoteles[.]com<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following post aims to provide information on a new malware campaign, Operation Golden Boa, which was identified and named<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,24],"tags":[],"class_list":["post-1406","post","type-post","status-publish","format-standard","hentry","category-malware","category-operation","category-vunerability"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/1406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=1406"}],"version-history":[{"count":40,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/1406\/revisions"}],"predecessor-version":[{"id":1488,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/1406\/revisions\/1488"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=1406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=1406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=1406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}