Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cyber Attacks»APT Campaign Unveils New ‘HrServ.dll’ Web Shell Targeting Afghan Government Systems

    APT Campaign Unveils New ‘HrServ.dll’ Web Shell Targeting Afghan Government Systems

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    In a recent cyber onslaught, an undisclosed Afghan governmental organization fell victim to a sophisticated attack orchestrated by an Advanced Persistent Threat (APT) group, featuring the deployment of a previously undocumented web shell named HrServ.

    Kaspersky, a leading cybersecurity firm, disclosed that the web shell, identified as a dynamic-link library (DLL) named “hrserv.dll,” boasts advanced features such as customized encoding methods for client communication and in-memory execution. Detailed analysis by Kaspersky researcher Mert Degirmenci, published this week, uncovered the intricacies of the attack.

    The Russian cybersecurity experts traced variants of the malware back to early 2021, drawing on compilation timestamps of artifacts associated with the malicious software.

    Web shells, like HrServ, are malicious tools granting remote control over compromised servers. Once deployed, threat actors gain the ability to conduct a variety of post-exploitation activities, ranging from data theft and server monitoring to lateral movement within the network.

    The attack sequence involves the utilization of the PAExec remote administration tool, serving as an alternative to PsExec. This tool acts as a launchpad to create a scheduled task masquerading as a seemingly benign Microsoft update (“MicrosoftsUpdate”). Subsequently, this task is configured to execute a Windows batch script (“JKNLA.bat”).

    The Batch script, taking the absolute path to the DLL file (“hrserv.dll”) as an argument, executes the file as a service, initiating an HTTP server capable of parsing incoming requests for subsequent actions.

    Mert Degirmenci highlighted, “Based on the type and information within an HTTP request, specific functions are activated.” He further pointed out that the GET parameters within the hrserv.dll file, mimicking Google services, include ‘hl,’ likely intended to camouflage rogue requests within network traffic.

    Embedded in HTTP GET and POST requests is a parameter called “cp,” with values ranging from 0 to 7 determining the next set of actions. These actions encompass spawning threads, creating files with arbitrary data, reading files, and accessing Outlook Web App HTML data.

    If the “cp” value in the POST request equals “6,” it triggers code execution by parsing encoded data, copying it into memory, creating a new thread, and inducing a sleep state.

    Additionally, the web shell can activate the execution of a stealthy “multifunctional implant” in memory, tasked with erasing forensic evidence by deleting the “MicrosoftsUpdate” job, as well as the initial DLL and batch files.

    Although the identity of the threat actor remains unknown, the presence of numerous typos in the source code suggests a non-native English speaker as the malware author. Degirmenci noted, “Notably, the web shell and memory implant use different strings for specific conditions,” concluding that “the malware’s characteristics align more with financially motivated malicious activity. However, its operational methodology exhibits similarities with APT behavior.”

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 70
    Trending
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleIranian Cyber Group Launches Sophisticated Attacks on Israeli Tech and Education Sectors
    Next Article How Hackers Phish for Your Users’ Credentials and Sell Them

    Related Posts

    General News December 26, 2025

    Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

    December 26, 2025
    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Cyber Attacks December 26, 2025

    Cybersecurity Experts Uncover ToddyCat’s Expanded Arsenal of Data Theft Tools

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.