Report

The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT

The Forrester Wave™: Managed Detection and Response, Q2 2023

The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT

This report offers a detailed analysis of a recent cyberattack conducted by the APT group known as "Sidecopy," believed to operate from Pakistan. This sophisticated operation utilized an RAR file as the initial vector to deliver a hidden payload—a malicious AllaKore Remote Access Trojan (RAT). Sidecopy's attack demonstrates a high level of sophistication and underscores the importance of ongoing vigilance in the realm of cybersecurity. 

As a response to this threat, the ThreatMon Malware Research Team conducted a comprehensive technical analysis, aiming to dissect the attack from inception to execution. The report furnishes insights into the attack's techniques, tactics, and procedures, serving as a valuable resource for security professionals and organizations seeking to bolster their defenses against similar threats. 

Key findings include:

  • The attack was primarily targeted at Indian Government Entities and employed a multifaceted attack chain that exploited a critical vulnerability in WinRAR (CVE-2023-38831). 
  • This sophisticated operation utilized an RAR file as the initial vector to deliver a hidden payload—a malicious AllaKore Remote Access Trojan (RAT). 
  • It encompasses an exploration of the WinRAR vulnerability, the intricacies of the AllaKore RAT, the specific MITRE ATT&CK techniques leveraged, a comprehensive list of Indicators of Compromise (IOCs), and a YARA rule for detection.
  • In an era of continually evolving cyber threats, this report acts as a crucial tool for understanding the modus operandi of APT groups like Sidecopy and reinforces the importance of proactively securing digital infrastructures against advanced adversaries. 


ThreatMon Free Trial

Download Download Here


Start Your Free Trial Now!

The 30-day free trial of ThreatMon allows users to explore the product's security benefits. During this trial period, you can test Threat Intelligence data, detect threats to your organization and recommend security measures.

Start Free Trial