Trend Micro researchers observed a new ViperSoftX malware campaign that unlike previous attacks relies on DLL sideloading for its arrival and execution technique.
The variant employed in the campaign supports a more sophisticated encryption method of byte remapping and a monthly rotation of the C2 server.
“Without the correct byte map, the encrypted shellcode, including all components and relevant data, cannot be correctly decrypted, making decryption and analysis of the shellcode more time-consuming for analysts.” reads the analysis published by Trend Micro.
ViperSoftX is a JavaScript-based Remote Access Trojan (RAT) and cryptocurrency stealer that was first analyzed by Fortinet in February 2020.
In November 2022, Avast researchers discovered a malicious extension for Chromium-based web browsers that was spreading via ViperSoftX.
The campaign detailed by Trend Micro infected a significant number of victims in the consumer and enterprise sectors. Most of the infections were observed in Australia, Japan, and the United States. The campaign also hit organizations from Southeast Asian countries, including the enterprise sector.
The initial attack vector is typically a software crack, an activator or a patcher, or a key generator (keygen). Upon launching the malware, it checks for a few virtualization strings and monitoring tools to prevent the execution in a virtual machine (VM).
One of the key steps performed by the malware before downloading a first-stage PowerShell loader is a series of anti-virtual machine, anti-monitoring, and anti-malware checks.
ViperSoftX also checks for active antivirus products running on the machine. If all checks pass, the loader decrypts and executes a second-stage PowerShell script. The script launches the main routine of the malware that installs malicious browser extensions to exfiltrate passwords and crypto wallet data.
The malware can target multiple web browsers, including Brave, Google Chrome, Firefox, Microsoft Edge, and Opera.
“The malware arrives as a package of the carrier executable and the decryptor/loader DLL, typically downloaded from the websites or torrents of (illegal) software solutions. For the most part, the malware is posed as a software activator, patcher, or keygen, among other similar software executables. The malicious routine starts after the software executables have been included and run in the system.” continues the report. “We also noticed that ViperSoftX’s primary C&C servers for the second stage download would change on a monthly basis”
The malware has evolved since its discovery, it can now check for cryptocurrencies and for a few password managers (KeePass 2 and 1Password). ViperSoftX also implements basic anti-C&C analyses by disallowing communications using web browsers.
The researchers pointed out that the pace of ViperSoftX’s development is slow compared to other types of information stealers.
“While other cybercriminals use sideloading to load another non-binary component (usually the encrypted payload, which comes together as a package with the normal executable and the sideloaded DLL), the chosen techniques of the actors behind ViperSoftX (which involve using WMI Query Language (WQL), DLL sideloading/DLL load order hijacking, PowerShell reflective loading, browser hijacking, and C&C protection) are sophisticated.” concludes the report. “The cybercriminals behind ViperSoftX are also skilled enough to execute a seamless chain for malware execution while staying under the radar of authorities by selecting one of the most effective methods for delivering malware to consumers.”
Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections:
Please nominate Security Affairs as your favorite blog.
Nominate here: https://docs.google.com/forms/d/e/1FAIpQLSfaFMkrMlrLhOBsRPKdv56Y4HgC88Bcji4V7OCxCm_OmyPoLw/viewform
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Atomic macOS Stealer)