Hackers use hijacked Microsoft Teams accounts to deliver ModeloRAT malware


Hackers are abusing Microsoft Teams accounts to impersonate IT support staff and push ModeloRAT malware into corporate environments.

The campaign uses a familiar workplace trust trick. Attackers contact employees through Teams, pose as helpdesk staff, and ask them to run a PowerShell command that appears to fix a device or account problem.

Once the victim runs the command, the attack drops a ZIP archive into the AppData folder, unpacks a portable Python environment, and launches ModeloRAT through pythonw.exe. This allows the malware to run quietly without showing a visible console window.

What makes the Teams attack dangerous

The attack moves the lure into a tool employees already use every day. A message from someone who appears to be IT support can feel more credible than a random email or browser pop-up.

The campaign has links to KongTuke, a threat cluster previously tied to CrashFix-style social engineering. Earlier activity used browser disruption, fake warnings, and Dropbox-hosted payloads to deliver ModeloRAT.

The newer approach keeps parts of that infection logic, but changes the delivery method. Instead of relying only on browser tricks, attackers can now reach victims through Teams chats using fake or compromised accounts.

At a glance

Item Details
Malware ModeloRAT
Delivery method Hijacked or fake Microsoft Teams accounts posing as IT support
Initial action Victim runs an obfuscated PowerShell command
Execution path ZIP archive extracted under AppData with a portable Python environment
Notable process pythonw.exe running from a user-writable folder
Main risk Remote access, reconnaissance, persistence, and command-and-control activity

How ModeloRAT runs on infected systems

The PowerShell command writes and extracts a ZIP archive under the user profile. The archive contains a portable Python setup, commonly associated with a directory named WPy64-31401.

This portable Python environment helps the malware run without depending on Python already being installed on the device. It also makes the activity look more like a bundled software component than a traditional executable payload.

The malware then uses pythonw.exe to execute malicious Python components in the background. Since pythonw.exe does not open a visible console window, the victim may not notice anything unusual after running the command.

ModeloRAT splits the attack into separate stages

The observed infection flow separates reconnaissance from command-and-control activity. One component collects information about the host, while another maintains communication with attacker infrastructure.

This structure gives attackers a cleaner way to gather system details before deciding what to do next. It can also make detection harder because defenders may see several smaller suspicious behaviors instead of one obvious payload.

Earlier research on CrashFix and ModeloRAT showed that the malware targets enterprise environments, especially domain-joined systems. That pattern makes the Teams delivery method more concerning for corporate networks.

Persistence makes cleanup harder

ModeloRAT does not rely only on the first PowerShell command to stay active. Reports describe persistence through a Windows Run registry key and scheduled task creation.

In the newer Teams-based activity, defenders reported scheduled task persistence using randomly generated names. This can make malicious entries harder to separate from legitimate maintenance tasks during a quick review.

Security teams should not treat removal of one persistence mechanism as a full cleanup. A system may still reinfect itself if another startup method remains active.

Indicators defenders should review

Type Indicator Why it matters
IP address 45[.]61[.]136[.]94 Reported ModeloRAT command-and-control infrastructure
IP address 64[.]95[.]10[.]14 Reported ModeloRAT command-and-control infrastructure
IP address 64[.]95[.]12[.]238 Reported ModeloRAT command-and-control infrastructure
IP address 64[.]95[.]13[.]76 Reported ModeloRAT command-and-control infrastructure
IP address 162[.]33[.]179[.]149 Reported ModeloRAT command-and-control infrastructure
File path %APPDATA%\WPy64-31401 Portable Python execution directory used in the attack chain
Process pythonw.exe Used to run malicious Python payloads without a visible console window

How organizations can reduce the risk

The fastest defensive step is to review Microsoft Teams external access settings. Organizations that do not need broad external chat should restrict who can contact employees from outside the tenant.

Microsoft allows administrators to manage external access in Teams, including allowing only specific external domains or blocking external communication paths. These controls can reduce the chance that unknown tenants reach employees directly.

Security teams should also train employees to treat unsolicited Teams support messages with caution. IT support requests that ask users to run PowerShell commands should trigger immediate verification through a trusted internal channel.

  • Restrict Teams external access to trusted domains where possible.
  • Block or alert on unexpected Dropbox downloads from corporate devices.
  • Monitor ZIP archive creation and extraction under AppData.
  • Alert on pythonw.exe running from AppData or other user-writable folders.
  • Review new Run registry keys and scheduled tasks.
  • Teach employees to verify IT support requests before running commands.

Why Microsoft Teams is an attractive delivery channel

Teams sits inside daily business workflows, so attackers can exploit the trust employees place in internal chat. A convincing message from a supposed IT technician can bypass the skepticism that users may apply to email attachments.

This does not mean Teams itself installs the malware. The key step still depends on social engineering. The attacker must convince the user to run a command manually.

That distinction matters for defenders. Strong endpoint controls help, but reducing risky chat exposure and improving helpdesk verification processes can disrupt the attack before malware execution begins.

What defenders should hunt for now

Security teams should look for a chain of suspicious events rather than a single indicator. A Teams message followed by PowerShell, ZIP extraction in AppData, portable Python execution, and new persistence entries should receive urgent attention.

Teams audit logs, endpoint telemetry, DNS logs, proxy logs, and EDR process trees can help connect these events. Analysts should also review recent user reports about unexpected IT support chats or requests to run diagnostic commands.

ModeloRAT shows how attackers continue to adapt social engineering for workplace tools. Organizations that treat chat security, identity controls, and endpoint monitoring as one connected problem will have a better chance of stopping this campaign early.

FAQ

What is ModeloRAT?

ModeloRAT is a Python-based remote access trojan linked to KongTuke activity. It can support reconnaissance, command-and-control activity, and persistent access on infected systems.

How are hackers using Microsoft Teams in this campaign?

Attackers use fake or hijacked Teams accounts to impersonate IT support staff. They then try to convince employees to run an obfuscated PowerShell command.

Does the attack require the victim to run a command?

Yes. The campaign relies on social engineering. The victim must run the attacker-provided PowerShell command for the infection chain to start.

What should organizations monitor for?

Organizations should monitor PowerShell activity, ZIP extraction under AppData, pythonw.exe execution from user-writable paths, new Run registry keys, and suspicious scheduled tasks.

How can admins reduce Microsoft Teams abuse?

Admins can restrict Teams external access, allow only trusted domains, block unmanaged external contact where possible, and require employees to verify unusual support requests through trusted internal channels.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages