Sunday, October 19, 2025

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Companies by way of Phishing ZIPs


Oct 18, 2025Ravie LakshmananMenace Intelligence / Cybercrime

Cybersecurity researchers have make clear a brand new marketing campaign that has possible focused the Russian car and e-commerce sectors with a beforehand undocumented .NET malware dubbed CAPI Backdoor.

In line with Seqrite Labs, the assault chain includes distributing phishing emails containing a ZIP archive as a technique to set off the an infection. The cybersecurity firm’s evaluation is predicated on the ZIP artifact that was uploaded to the VirusTotal platform on October 3, 2025.

Current with the archive is a decoy Russian-language doc that purports to be a notification associated to earnings tax laws and a Home windows shortcut (LNK) file.

The LNK file, which has the identical title because the ZIP archive (i.e., “Перерасчет заработной платы 01.10.2025”), is liable for the execution of the .NET implant (“adobe.dll”) utilizing a reliable Microsoft binary named “rundll32.exe,” a living-off-the-land (LotL) method recognized to be adopted by risk actors.

DFIR Retainer Services

The backdoor, Seqrite famous, comes with features to test if it is operating with administrator-level privileges, collect an inventory of put in antivirus merchandise, and open the decoy doc as a ruse, whereas it stealthily connects to a distant server (“91.223.75[.]96”) to obtain additional instructions for execution.

The instructions enable CAPI Backdoor to steal knowledge from net browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox; take screenshots; gather system data; enumerate folder contents; and exfiltrate the outcomes again to the server.

It additionally makes an attempt to run a protracted checklist of checks to find out if it is a reliable host or a digital machine, and makes use of two strategies to ascertain persistence, together with establishing a scheduled activity and making a LNK file within the Home windows Startup folder to mechanically launch the backdoor DLL copied to the Home windows Roaming folder.

Seqrite’s evaluation that the risk actor is focusing on the Russian car sector is all the way down to the truth that one of many domains linked to the marketing campaign is called carprlce[.]ru, which seems to impersonate the reliable “carprice[.]ru.”

“The malicious payload is a .NET DLL that features as a stealer and establishes persistence for future malicious actions,” researchers Priya Patel and Subhajeet Singha mentioned.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com