Fake Software Installers Used to Drop RATs and Monero Miners in Long-Running Malware Campaign

By Published On: April 8, 2026

In the quiet corners of the internet, a persistent and financially motivated threat actor has been operating under the radar for over two years, leveraging a deceptive tactic that continues to ensnare unsuspecting users. This ongoing campaign, designated as REF1695, capitalizes on the trust users place in software downloads, distributing malicious payloads camouflaged as legitimate installers. The objective? To secretly deploy Remote Access Trojans (RATs) and Monero cryptocurrency miners, transforming victims’ systems into tools for illicit gain.

This blog post delves into the specifics of this long-running malware campaign, examining its methods, the threats it poses, and offering critical insights for IT professionals, security analysts, and developers to bolster their defenses. Understanding the nuances of REF1695 is paramount for safeguarding digital environments against such stealthy and financially driven attacks.

The Deceptive Lure: Fake Software Installers

The core of the REF1695 operation relies on social engineering, specifically the distribution of fake software installers. Users, believing they are downloading legitimate applications, inadvertently execute malicious code. These installers are meticulously crafted to appear authentic, often mimicking popular software titles to maximize their chances of success.

Once executed, these seemingly innocuous installers do not deliver the promised software. Instead, they act as conduits for harmful payloads, establishing a foothold on the victim’s system. This initial compromise is crucial for the attacker, enabling them to proceed with further malicious activities without immediate detection.

Understanding the Payloads: RATs and Monero Miners

The REF1695 campaign deploys two primary categories of malware: Remote Access Trojans (RATs) and Monero cryptocurrency miners. Each serves a distinct purpose in the attacker’s financial motivation.

  • Remote Access Trojans (RATs): These insidious tools grant attackers unauthorized remote control over a compromised system. With a RAT, malicious actors can:
    • Access files and sensitive data.
    • Monitor user activity, including keystrokes.
    • Execute commands remotely.
    • Install additional malware.
    • Control attached devices, such as webcams and microphones.

    The presence of a RAT transforms a victim’s machine into a persistent entry point, allowing for ongoing surveillance and data exfiltration. Examples of common RATs include NanoCore and Remcos. While the source material doesn’t specify the exact RATs used in REF1695, familiarity with their general capabilities is important.

  • Monero Cryptocurrency Miners: Monero (XMR) is a privacy-focused cryptocurrency, making it an attractive target for illicit mining operations. Attackers deploy Monero miners to secretly leverage the victim’s CPU and GPU resources to mine XMR. This process consumes significant system resources, leading to:
    • Slowed system performance.
    • Increased power consumption.
    • Reduced hardware lifespan due to overheating.

    The collective mining power from numerous compromised machines generates a steady stream of passive income for the threat actor, all at the victim’s expense.

The Longevity of REF1695: A Stealthy Evolution

The fact that REF1695 has been active since at least late 2023 and has continued to expand its toolset “under the radar” for over two years highlights its sophistication and stealth. This longevity suggests:

  • Adaptive Techniques: The threat actor likely modifies their distribution methods and malware signatures to evade detection by security solutions.
  • Low Profile Operations: Rather than aiming for high-impact, short-lived attacks, REF1695 opts for a consistent, less detectable approach, accumulating smaller gains over extended periods.
  • Effective Obfuscation: The malware employed likely uses various obfuscation techniques to hide its true intent and evade analysis.

Remediation Actions and Proactive Defense

Protecting against campaigns like REF1695 requires a multi-layered approach focusing on user education, robust technical controls, and continuous monitoring.

  • User Education is Paramount: Train users to be suspicious of unsolicited software downloads and to always verify the source of installers. Emphasize downloading software only from official vendor websites or trusted application stores.
  • Implement Application Whitelisting: Restrict the execution of unauthorized applications on endpoints. This can significantly reduce the risk of malicious installers running.
  • Utilize Advanced Endpoint Detection and Response (EDR) Solutions: EDR tools can detect anomalous behavior indicative of RATs or cryptominers, even for previously unknown threats.
  • Keep Software and Operating Systems Updated: Promptly apply security patches to operating systems and all installed software. This mitigates vulnerabilities that attackers might exploit to gain initial access, even if the user bypasses a fake installer. While specific CVEs for REF1695 aren’t provided, maintaining patch hygiene is a general best practice for mitigating numerous threats. For example, staying updated helps prevent exploitation of vulnerabilities like CVE-2023-38831 (WinRAR ACE vulnerability) or CVE-2023-28252 (Windows GDI privilege escalation).
  • Deploy Network Intrusion Detection/Prevention Systems (NIDS/NIPS): These systems can identify and block known command-and-control (C2) communication associated with RATs or detect traffic patterns indicative of cryptomining.
  • Monitor for Unusual System Performance: Educate users and IT staff to report sudden decreases in system performance, overheating, or unusually high CPU/GPU utilization, which can be indicators of cryptomining activity.
  • Implement Strong Email and Web Filtering: Block malicious attachments and restrict access to known malicious websites, which are common vectors for distributing fake installers.
  • Regularly Back Up Data: In case of a compromise, having recent backups can significantly reduce the impact of data loss or encryption by ransomware (though not the primary payload here, it’s a critical security practice).

Tool Name Purpose Link
Endpoint Detection and Response (EDR) Solutions Advanced threat detection, behavior analysis, and incident response at the endpoint level. (Vendor-specific)
Network Intrusion Detection/Prevention Systems (NIDS/NIPS) Monitor network traffic for malicious activity and policy violations. (Vendor-specific)
Application Whitelisting Software Controls which applications are allowed to run on a system. (Vendor-specific)
Antivirus/Anti-Malware Software Detects and removes known malware, including RATs and cryptominers. (Vendor-specific)

Conclusion

The REF1695 campaign serves as a stark reminder of the financial motivations driving a significant portion of today’s cyber threats. Its longevity and stealth underscore the necessity for continuous vigilance and proactive security measures. By understanding the tactics employed, such as deceptive software installers and the deployment of RATs and Monero miners, organizations and individuals can significantly strengthen their defenses.

Staying informed, prioritizing user education, and implementing robust technical controls are not merely recommendations; they are essential steps in protecting against persistent, low-profile campaigns that seek to exploit trust for illicit financial gain.

Share this article

Leave A Comment