Amaranth-Dragon Weaponizing CVE-2025-8088 for Targeted Espio...#1859
Open
carlospolop wants to merge 1 commit intomasterfrom
Open
Amaranth-Dragon Weaponizing CVE-2025-8088 for Targeted Espio...#1859carlospolop wants to merge 1 commit intomasterfrom
carlospolop wants to merge 1 commit intomasterfrom
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://research.checkpoint.com/2026/amaranth-dragon-weaponizes-cve-2025-8088-for-targeted-espionage/ Content Categories: Based on the analysis, this content was categorized under "Pentesting Web / File Upload & Archives -> Archive Extraction Path Traversal (add WinRAR CVE-2025-8088 Startup-folder persistence variant) and/or Windows -> Windows Local Privilege Escalation / Persistence (Startup folder drop) + Windows -> Dll Hijacking (signed binary sideloading) + optionally Windows post-exploitation/evasion notes (fiber execution, ntdll unhooking, Telegram C2)". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title/Context
Check Point Research (CPR) tracked Amaranth-Dragon, a China-nexus cluster with overlaps to APT-41 tooling/TTPs, conducting highly targeted cyber-espionage campaigns throughout 2025 against government and law enforcement organizations in Southeast Asia (Cambodia, Thailand, Laos, Indonesia, Singapore, Philippines). CPR infers operations align with UTC+8 (China Standard Time) based on compilation times, archive timestamps, an...
🔧 Technical Details
Weaponize archive path traversal (CVE-2025-8088) for arbitrary file write → Startup persistence
If an archive extractor is vulnerable to path traversal, a crafted RAR can write files outside the chosen extraction folder by embedding traversal sequences like
../. Attackers can aim the write into a stable autostart location (e.g., a user Startup folder) so the dropped.cmd/.batexecutes on next logon/reboot. In practice, payloads may attempt multiple traversal depths to reach the correct Startup path depending on the user’s extraction directory.Signed-binary DLL sideloading as the execution primitive
Bundle a legitimate signed EXE with a malicious DLL named as an expected dependency (e.g.,
DllSafeCheck64.dll,libcef.dll). When the EXE runs, Windows loads the attacker DLL from the same directory, executing the malicious export. A common evasion pattern is exporting multiple functions where onl...🤖 Agent Actions
Updated three HackTricks sections with Amaranth-Dragon tradecraft: expanded the archive path traversal page with CVE-2025-8088 Startup-folder persistence details and added reference; enhanced DLL hijacking page with a full Amaranth/TGAmaranth sideloading pattern (double-URL AES loader, export stubbing, RC4-variant + fiber execution, ntdll unhooking) and cited the new source; enriched Windows autoruns persistence guidance with a concrete CVE-2025-8088 Startup dropper flow and added the related reference.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.