Overview
Multiple intrusion sets have been observed actively exploiting CVE-2025-8088, a path traversal vulnerability in WinRAR, to establish initial access and deploy modular malware frameworks. The activity is characterized by:
- Use of crafted RAR archives as the primary infection vector
- Abuse of Alternate Data Streams (ADS) for payload concealment
- Deployment of a custom first-stage loader (“Amaranth Loader”)
- Follow-on tooling including Havoc and a Telegram-based RAT
- Region-restricted command-and-control infrastructure
The campaigns are selective and operationally restrained, suggesting a focus on long-term access rather than monetization.
Vulnerability Details: CVE-2025-8088
- Affected software: WinRAR prior to version 7.13
- Vulnerability class: Path traversal
- Impact: Arbitrary file write leading to code execution
- Attack mechanism:
- Malicious RAR archive contains files with crafted paths
- Upon extraction, files are written outside the intended directory
- Payloads are dropped into Startup folders or locations referenced by LNK files
Although a patch is available, exploitation continues against unpatched environments.
Initial Access and Delivery
Observed delivery mechanisms include:
- Spear-phishing emails with RAR attachments
- Archive contents themed around diplomatic, legal, or policy-related topics
- Decoy documents displayed to the user while malicious files are written via ADS
Typical archive structure:
Document.pdf(decoy)Document.pdf:payload.dll(ADS-hidden payload)launcher.lnkorrun.cmdto trigger execution
Execution and Persistence
Once extracted, execution chains commonly involve:
- LNK files invoking
cmd.exeorrundll32.exe - DLL side-loading via a legitimate signed executable
- Persistence achieved through:
- Startup folder placement
- Registry
Runkeys - Scheduled tasks in limited cases
The initial loader runs with user-level privileges and avoids noisy escalation attempts.
Malware Tooling
Amaranth Loader
- Custom first-stage loader
- Encrypted configuration embedded in the binary
- Resolves C2 endpoints at runtime
- Loads next-stage payloads entirely in memory
Havoc Framework
- Used as a post-exploitation C2 platform
- Supports file operations, process injection, and credential access
- HTTP(S)-based communications with configurable jitter
TGAmaranth RAT
- Lightweight RAT controlled via Telegram bots
- Supports command execution, file exfiltration, and system profiling
- Designed for environments with restrictive egress controls
Command-and-Control Infrastructure
Infrastructure characteristics include:
- HTTPS-based C2 endpoints
- Fronting via commercial CDN providers
- Geofencing rules limiting responses to specific IP ranges
- Short-lived domains with minimal DNS history
This approach reduces exposure to automated scanning and sandbox detonation.
MITRE ATT&CK Mapping
| Tactic | Technique | ID | Notes |
|---|---|---|---|
| Initial Access | Phishing Attachment | T1566.001 | Malicious RAR archives |
| Execution | Command and Scripting Interpreter | T1059.003 | CMD via LNK files |
| Execution | DLL Side-Loading | T1574.002 | Legitimate executable abuse |
| Persistence | Startup Folder | T1547.001 | Payload auto-launch |
| Persistence | Registry Run Keys | T1547.001 | User-level persistence |
| Defense Evasion | Obfuscated Files or Information | T1027 | Encrypted loader configs |
| Command and Control | Web Protocols | T1071.001 | HTTPS-based C2 |
| Command and Control | Proxy | T1090 | CDN fronting |
Indicators of Compromise
File Artifacts
- RAR archives containing ADS entries
- LNK files referencing
%APPDATA%or%TEMP% - DLLs without version metadata dropped outside archive directory
Registry
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\*- Values pointing to user-writable directories
Network
- HTTPS traffic to low-reputation domains behind CDNs
- Beaconing intervals with consistent jitter
- TLS sessions without SNI or with generic user agents
Structured intelligence note:
Machine-readable STIX 2.1 bundles, including file hashes, domains, IP addresses, ATT&CK mappings, and observed relationships, are available via threatlandscape.io and compatible intelligence-sharing platforms.
Detection and Monitoring Recommendations
- Alert on WinRAR extraction events writing outside the target directory
- Monitor for creation of files via Alternate Data Streams
- Detect LNK execution spawning script interpreters
- Flag unsigned DLLs loaded by signed binaries from user directories
- Inspect outbound HTTPS traffic to newly registered domains
Conclusion
The continued exploitation of CVE-2025-8088 highlights how client-side vulnerabilities remain effective entry points for disciplined intrusion activity. The combination of archive-based exploitation, custom loaders, and evasive infrastructure reinforces the need for proactive monitoring beyond patch management.