<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(hunt.io) Malware Delivery via Open Directories: AsyncRAT and Cobalt Strike Campaign Analysis]]></title><description><![CDATA[<p>(hunt.io) Malware Delivery via Open Directories: AsyncRAT and Cobalt Strike Campaign Analysis</p><p>New analysis reveals threat actors exploiting open directories to deliver AsyncRAT and Cobalt Strike in multi-stage campaigns.</p><p>In brief - Adversaries are using exposed open directories to host and deliver malware, including AsyncRAT via BITS abuse and Cobalt Strike through Fernet-encrypted Python executables. These campaigns demonstrate how unsecured infrastructure enables sophisticated intrusions.</p><p>Technically - Campaign 1: VBScript (xx.txt) creates temp.xml with PowerShell, abuses BITSAdmin to fetch a disguised ZIP (f.jpg) containing 9 files, then self-deletes. Campaign 2: PyInstaller-compiled 1.exe (~10MB) uses Fernet to decrypt Cobalt Strike shellcode from a.txt, executed in-memory. The binary includes obfuscation (Base64 Chinese strings, QuickSort noise) and links to Supershell C2 (207.32.217[.]21, 121.37.21[.]229). Both leverage open directories for payload staging.</p><p>Source: <a href="https://hunt.io/blog/gateway-to-intrusion" rel="nofollow noopener"><span>https://</span><span>hunt.io/blog/gateway-to-intrus</span><span>ion</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/49bf6e4a-f02a-4e9a-b337-0593129d38b4/hunt.io-malware-delivery-via-open-directories-asyncrat-and-cobalt-strike-campaign-analysis</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 08:38:49 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/49bf6e4a-f02a-4e9a-b337-0593129d38b4.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 22 Apr 2026 11:27:31 GMT</pubDate><ttl>60</ttl></channel></rss>