SBN

Tax Season Threat Surge 

Veriti Research has identified a significant rise in tax-related malware samples across multiple platforms. The research team discovered malware samples targeting Android, Linux, and Windows, all connected to the same adversary operating from a single IP address. 

We believe the attacker is running multiple parallel campaigns and using “Malware-as-a-Service” tools to target various platforms simultaneously, thereby increasing their chances of success. 

Campaign 1 

The malicious activity is traced back to the IP address 45.134.255[.]90, associated with a host named WINDOWS-U65VHC9, which is likely orchestrating the malware campaigns. Based on the machine’s timezone (UTC+1), the attacker appears to be operating from Europe. 

Malware Used by the Attacker (Focused on ‘Tax Attacks’): 

Potential Android Malware – CraxsRAT 

  • File Name: Signed Form 8879 
  • Creation Date: March 13, 2025 
  • Possibly related to CraxsRAT – an Android Remote Access Trojan (RAT) 
  • Related sample Link 
  • Communicates with IP: 45.134.255[.]90 

Reference about the malwareImagine if someone could secretly control your phone! That’s the scary reality with CraxsRat, a hidden Android app that gives bad guys the keys to your digital kingdom. This sneaky malware lets them peek at your messages, steal your passwords, and even track your location!” 
 

Windows Malware – Ratty RAT 

  • File Name: Tax_Documents_PDF.jar 
  • Hybrid Analysis Link 
  • Communicates with IP: 45.134.255[.]90 

Additional Windows Samples: 

  • Tax_Documents_PDF.zip Link 
  • MARY_2024_W2_1040_PDF.jar Link 
     

Campaign 2: Rhadamanthys Returns 

File Name: 1099-NEC.pdf 

  • Hybrid Analysis Link 
  • VirusTotal Link 
     

As described in another blog, this malware uses valid domains to boost its reputation and evade detection. 

Malware IoCs 

Example hashes: 

  • 8992cb472893d37b697f4d4d6a9d3a8f1a59f3cc9172d242f30945d0861e42f9 
  • b2f7a9cffb3ad32b31def63dc69827d26af87036c6b0f092d7ed742cd5d067d6 

Malicious domains: 

  • marchlkalanew6.blogspot[.]com/lundchikha.doc 
  • kalacpamarchclean.blogspot[.]com/chig.doc 

Malicious IPs: 

  • 185.208.159[.]170 

When pivoting on files communicating with this malicious IP, several tax-themed malicious files were found: 

  • 1694b2792731196891f05860b063fc3fe9dd1b54b2280839be3f1bb6793283e5 – W2-Linda_Williams.pdf.js 
  • 3d00953ec06a4a41d0f4c0e7edd4c2c421129102663eff205d4b80eae75d4ba0 – James_Smith_Tax_Document_2024.pdf.js 
  • 83fa16f72c36b0003cdc4dd717f6da1f3a4526b3ab5300f6a1df9a7a304e4946 – 4BQV7_James_Smith_Tax_Document_2024.pdf.js 
  • f757e2972b57bbc47c107579a74728fa387de94dbecf0124f893a394d80c1b30 – Elizabeth_Jones_Tax_Document_2024.pdf(1).js 

Older Campaigns and Office Vulnerabilities 

Older campaigns have exploited the following vulnerabilities: 

  • CVE-2017-0199 
  • CVE-2021-40444 

Despite being patched, these vulnerabilities are often still present in user environments, especially for consumers who lack enterprise-grade patch management tools. 

Malicious Files Utilizing those Vulnerabilities Samples: 

File Name  SHA256  Tags  CVE 
income_tax_and_benefit_return_2021.docx  d0e1f97dbe2d0af9342e64d460527b088d85f96d38b1d1d4aa610c0987dca745  #apt #keylogger  CVE-2017-0199 
Employees_Contact_Audit_Oct_2021.docx  ed2b9e22aef3e545814519151528b2d11a5e73d1b2119c067e672b653ab6855a  #lds #apt  CVE-2021-40444 
Employee_W2_Form.docx  679bbe0c50754853978a3a583505ebb99bce720cf26a6aaf8be06cd879701ff1  #lds #apt  CVE-2021-40444 

Phishing Campaign 

In recent weeks, Veriti Research observed numerous newly created phishing domains potentially linked to upcoming tax-themed attacks. 

Interestingly, some domains have shown initial activity originating from India, despite being designed to target U.S. IRS-related users. 

High Severity Domains: 

  • irs-government[.]com 
  • Irstaxrefund[.]info 
  • Irstaxrefund[.]online 
  • mygov-taxclaim[.]com 
  • www4irs-gov[.]com 
  • irs-gov[.]info 
  • crypto-tax[.]info 
  • print-my-social-security-1099-us-en-9030592[.]live 
  • gov-tax[.]cyou 
  • Taxatogov[.]com 

Medium Severity Domains: 

  • print-my-social-security-1099-us-en-6722402[.]zone 
  • preparegov-mytax2025[.]com 
  • irs-crypto[.]info 
  • Notaxesfortrump[.]com 
  • Cryptobillionheirs[.]com 

Veriti Research has also observed additional indicators that may be tied to emerging campaigns aiming to exploit the tax season. 

Suspicious Domains: 

  • w-2payroll[.]com 
  • w-2free[.]com 
  • Taxdemandgov[.]com 
  • Donttaxmyira[.]com 
  • Donottaxmyira[.]com 

Associated IP Address: 

  • 15.197.148[.]33 

Veriti’s research team continues to monitor and track these threats during the upcoming tax season. 

*** This is a Security Bloggers Network syndicated blog from VERITI authored by Veriti Research. Read the original post at: https://veriti.ai/blog/veriti-research/tax-season-threat-surge/