www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Errors
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
  • en English▼
    af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: FINALDRAFT Malware
Share
en English▼
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
en English▼
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Malware > FINALDRAFT Malware
MalwareTrojans

FINALDRAFT Malware

FINALDRAFT Malware: A Dangerous Threat for Data Exfiltration and System Manipulation

riviTMedia Research
Last updated: February 16, 2025 5:19 pm
riviTMedia Research
Share
FINALDRAFT Malware: A Dangerous Threat for Data Exfiltration and System Manipulation
SHARE

Cybersecurity researchers have uncovered a sophisticated and dangerous malware known as FINALDRAFT. Written in C++, FINALDRAFT is specifically designed for data exfiltration, process injection, and system manipulation. The malware is typically delivered through another malicious program called PATHLOADER. Once executed, FINALDRAFT establishes a connection with a command-and-control (C2) server via the Microsoft Graph API using Outlook. Infected systems can be controlled remotely, with attackers able to execute a wide variety of malicious operations.

Contents
Threat Summary: FINALDRAFT MalwareDownload SpyHunter Now & Scan Your Computer For Free!Understanding FINALDRAFT MalwareData ExfiltrationProcess InjectionCommand-and-Control CommunicationFile ManipulationNetwork EnumerationStealthy PowerShell ExecutionPass-the-Hash AttacksCross-Platform CapabilityHow FINALDRAFT Infects DevicesThe Impact of a FINALDRAFT InfectionHow to Remove FINALDRAFT MalwareFINALDRAFT MalwareStep 1: Reboot in Safe ModeStep 2: Terminate Suspicious ProcessesStep 3: Delete Malicious FilesStep 4: Remove Registry EntriesStep 5: Run SpyHunter ScanPreventing FINALDRAFT and Similar MalwareConclusionFINALDRAFT Malware

Threat Summary: FINALDRAFT Malware

To better understand FINALDRAFT, here’s a summary of its key characteristics:

AttributeDetails
NameFINALDRAFT
Threat TypeMalware (Data Exfiltration, Process Injection)
Detection NamesAvast (Win64:AutoHotLoader-A [Drp]), Combo Cleaner (Generic.ShellCode.RDI.Marte.10.793299A0), Emsisoft (Generic.ShellCode.RDI.Marte.10.793299A0 (B)), Kaspersky (HEUR:Trojan.Multi.Shellcode.gen), Symantec (Trojan Horse)
SymptomsNo visible symptoms; operates stealthily
Distribution MethodsInfected email attachments, malicious ads, social engineering, software cracks
DamageStolen passwords, identity theft, unauthorized access, botnet enlistment
Danger LevelHigh

Download SpyHunter Now & Scan Your Computer For Free!

Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It’s FREE!

Download SpyHunter 5
Download SpyHunter for Mac

Understanding FINALDRAFT Malware

FINALDRAFT is a highly advanced piece of malware that uses various sophisticated techniques to infiltrate and compromise systems. Let’s break down its core functionalities:

Data Exfiltration

The primary function of FINALDRAFT is data exfiltration. Once installed, it collects sensitive information, including:

  • Computer name
  • Username
  • IP addresses
  • Running process details
  • Passwords and banking credentials

Process Injection

FINALDRAFT uses process injection to execute malicious code in legitimate processes. This allows it to remain hidden from security software and perform various operations without detection.

Command-and-Control Communication

FINALDRAFT communicates with a C2 server using the Microsoft Graph API through Outlook. It maintains communication by storing a registry key that helps it interact with the C2 server covertly.

File Manipulation

The malware can manipulate files by:

  • Copying files using standard and low-level disk cluster copying methods
  • Deleting files securely by overwriting data with zeros to prevent recovery

Network Enumeration

FINALDRAFT includes a network enumeration module that gathers information about network infrastructure and transmits it through a password-protected communication channel.

Stealthy PowerShell Execution

By bypassing standard security mechanisms, FINALDRAFT can execute PowerShell commands in the background, often without triggering alerts.

Pass-the-Hash Attacks

FINALDRAFT employs a Pass-the-Hash technique to reuse stolen credentials, allowing attackers to execute processes with higher privileges.

Cross-Platform Capability

An ELF version of FINALDRAFT exists for Linux systems. While this variant has fewer features than the Windows version, it still poses a significant threat.


How FINALDRAFT Infects Devices

The most common methods used to distribute FINALDRAFT include:

  • Phishing Emails: Infected attachments or malicious links in seemingly legitimate emails.
  • Malicious Advertisements (Malvertising): Online ads that, when clicked, initiate malware downloads.
  • Social Engineering: Manipulating victims into downloading malicious files.
  • Software Cracks and Pirated Software: Malware is often bundled with cracked or pirated software.

The Impact of a FINALDRAFT Infection

FINALDRAFT poses several risks to infected systems, including:

  • Data Theft: Sensitive data, including credentials and banking information, is stolen.
  • Identity Theft: Stolen information may be used for identity fraud.
  • Unauthorized Access: Attackers gain full control over compromised systems.
  • Botnet Recruitment: Infected machines can become part of a botnet, used for large-scale cyberattacks.

How to Remove FINALDRAFT Malware

Remove

FINALDRAFT Malware

With SpyHunter

Download SpyHunter 5
Download SpyHunter for Mac

Step 1: Reboot in Safe Mode

  1. Restart your computer.
  2. Press F8 (or Shift + F8) repeatedly before Windows boots.
  3. Select Safe Mode with Networking.

Step 2: Terminate Suspicious Processes

  1. Press Ctrl + Shift + Esc to open Task Manager.
  2. Look for unusual processes (e.g., unknown names or high resource usage).
  3. Right-click the process and select End Task.

Step 3: Delete Malicious Files

  1. Open File Explorer.
  2. Navigate to C:\Windows\Temp and C:\Users[Your Username]\AppData\Local\Temp.
  3. Delete suspicious files.

Step 4: Remove Registry Entries

  1. Press Windows + R, type regedit, and press Enter.
  2. Navigate to:
    • HKEY_LOCAL_MACHINE\Software
    • HKEY_CURRENT_USER\Software
  3. Remove any suspicious entries related to FINALDRAFT.

Step 5: Run SpyHunter Scan

  1. Download SpyHunter.
  2. Install and launch the application.
  3. Run a full system scan.
  4. Once the scan completes, click Fix Threats to remove FINALDRAFT.
Download SpyHunter 5
Download SpyHunter for Mac

Preventing FINALDRAFT and Similar Malware

  • Be Cautious with Emails: Avoid clicking on links or downloading attachments from unknown senders.
  • Regular Software Updates: Keep your operating system and software updated to patch security vulnerabilities.
  • Use Reliable Security Software: Invest in a reputable antivirus solution like SpyHunter.
  • Avoid Pirated Software: Download software only from trusted sources.
  • Practice Safe Browsing: Use ad-blockers to minimize exposure to malicious advertisements.

Conclusion

FINALDRAFT malware represents a significant threat to both individuals and organizations due to its advanced capabilities in data exfiltration and system control. By understanding its functionality, recognizing its potential damage, and following our detailed removal guide with SpyHunter, users can effectively protect their systems. Proactive security practices are essential in mitigating the risks posed by sophisticated threats like FINALDRAFT.

Remove

FINALDRAFT Malware

With SpyHunter

Download SpyHunter 5
Download SpyHunter for Mac

You Might Also Like

Program:Win32/Wacapew.C!ml Malware: A Guide to Removal and Prevention
Searchinstyle.com Browser Hijacker: Detailed Removal Guide and Prevention Tips
Remove DefaultAgent from Your Mac
UpgradeSample Malware: A Comprehensive Removal Guide
FormatLocator Adware: Overview and Threat Assessment
TAGGED:C++ malware analysiscommand-and-control malwarecyber threat preventiondata exfiltration malwareFINALDRAFT antivirusFINALDRAFT attackFINALDRAFT botnetFINALDRAFT C2 communicationFINALDRAFT cybersecurityFINALDRAFT data exfiltrationFINALDRAFT detection namesFINALDRAFT file manipulationFINALDRAFT infectionFINALDRAFT Linux versionFINALDRAFT malwareFINALDRAFT Microsoft Graph APIFINALDRAFT PowerShell bypassFINALDRAFT preventionFINALDRAFT process injectionFINALDRAFT registry keyFINALDRAFT remote accessFINALDRAFT removal guideFINALDRAFT removal SpyHunterFINALDRAFT spywareFINALDRAFT threat analysisFINALDRAFT threat detectionFINALDRAFT trojanFINALDRAFT virusFINALDRAFT Windows malwarehow to remove FINALDRAFTLinux ELF malwareMalware detectionMicrosoft Graph API malwarepass-the-hash attack preventionprocess injection trojanremove FINALDRAFTSpyHunter antivirusspyware removalTrojan malware removal guideWindows malware removal

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

Your Details

Let us know how to get back to you.

Example: user@website.com
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article What is Threat Detection and Response (TDR)? A Complete Guide for Small Businesses
Next Article Ciawu App
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter 5
Download SpyHunter for Mac

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Your Details

Let us know how to get back to you.

Example: user@website.com
www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US