FinalDraft Malware Uses Outlook Drafts for Covert C2

by | Feb 17, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Targeted Attacks Against a Government Ministry

A newly discovered malware named FinalDraft has been observed using Outlook email drafts as a command-and-control (C2) channel in attacks against a South American government ministry.

Researchers at Elastic Security Labs uncovered the malware, which operates as part of a sophisticated toolset that includes:

  • PathLoader: A custom malware loader
  • FinalDraft: A backdoor for data exfiltration and process injection
  • Post-exploitation tools: Used for credential theft and lateral movement

How the Attack Works

The attack begins when the threat actor compromises a system using PathLoader, which executes shellcode retrieved from an attacker-controlled server. This shellcode loads FinalDraft into memory.

Covert Communication via Outlook

Once executed, FinalDraft establishes communication with the attacker’s infrastructure using Microsoft Graph API by reading and writing to Outlook email drafts instead of sending messages. This technique enables:

  • Stealthy command execution: The malware receives commands hidden inside drafts (e.g., r_<session-id>)
  • Covert data exfiltration: Responses are stored in separate drafts (e.g., p_<session-id>)
  • Forensic evasion: Once executed, commands are deleted, making detection difficult

Additionally, FinalDraft retrieves an OAuth refresh token from its configuration and stores it in the Windows Registry, ensuring persistent access.

Token stored in RegistryToken stored in the Windows Registry
Source: Elastic Security

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Capabilities of FinalDraft

The backdoor supports 37 different commands, allowing attackers to:

  • Steal sensitive data (files, credentials, system information)
  • Inject malicious payloads into legitimate processes (e.g., mspaint.exe)
  • Execute PowerShell commands without launching powershell.exe
  • Perform Pass-the-Hash attacks for lateral movement
  • Proxy network traffic to conceal malicious activity

Researchers also found a Linux variant of FinalDraft, which can still use Outlook as a C2 channel and supports DNS, ICMP, TCP, and UDP-based communication.

FinalDraft operational overviewFinalDraft operational overview
Source: Elastic Security

REF7707: A Coordinated Espionage Operation

Elastic Security Labs attributes these attacks to a cyber-espionage campaign dubbed REF7707, which primarily targeted a foreign ministry in South America. However, infrastructure analysis revealed connections to additional victims in Southeast Asia, indicating a larger operation.

Key Findings:

  • The attackers leveraged compromised telecommunications and ISP infrastructure in Southeast Asia
  • A Southeast Asian university’s storage system was used to host malware payloads, suggesting either a prior breach or a supply chain compromise
  • Another malware loader named GuidLoader was discovered, capable of decrypting and executing payloads in memory

REF7077 malware timelineREF7077 malware timeline
Source: Elastic Security




Mitigation and Detection

To defend against this attack, organizations should:

  • Monitor Outlook drafts for suspicious activity
  • Restrict OAuth token access and enforce strict authentication policies
  • Analyze network traffic for unexpected Microsoft Graph API requests
  • Use YARA rules provided by Elastic Security Labs to detect FinalDraft, PathLoader, and GuidLoader

References:

Elastic Security Labs has published YARA rules and detailed indicators of compromise in their official reports.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This