Cisco IronPort
Finance-themed emails found in environments protected by Cisco Ironport and Microsoft ATP deliver an attached PDF that contains a link to a WSF script. When run, the WSF is used to a chain of a JSDropper, Malicious Batch Script, Python Installer, and VBS scripts that run multiple instances of DcRAT, Async RAT, Pure RAT, and Venom RAT in memory. At the time of analysis, additional payloads from other campaigns have been found.