The BlindEagle APT group (APT-C-36) has been targeting victims in Columbia and Ecuador in an ongoing phishing campaign used to deliver the QuasarRAT.
The emails contain subject lines that made them appear to be from the Colombian Government, the email contained both a shortened URL link as well as a PDF attachment that contained the same link.
Upon clicking the shortened link, a compressed and password protected file with an LHA (archive) extension was downloaded which contained the QuasarRAT that was unpacked and deployed to the machine, however if the request was made from a machine originating from outside of Colombia the infection process is terminated.
In an additional campaign, Ecuador and Columbia were both targeted with phishing emails and subject lines made to appear to be from the Ecuadorian Government.
The campaign was more elaborate in that the threat used delivered a RAR file that contained an executable python file that was spawn the Windows binary MSHTA to retrieve additional payloads, scripts that would perform system checks, disable anti malware/behavior detection software, and eventually load an in-memory Meterpreter payload