Thursday, January 16, 2025
HomeCyber Security NewsNew CleverSoar Malware Attacking Windows Users Bypassing Security Mechanisms

New CleverSoar Malware Attacking Windows Users Bypassing Security Mechanisms

Published on

SIEM as a Service

Follow Us on Google News

CleverSoar, a new malware installer, targets Chinese and Vietnamese users to deploy advanced tools like Winos4.0 and Nidhogg rootkit. These tools enable keylogging, data theft, security circumvention, and stealthy system control for potential long-term espionage.

It was initially uploaded to VirusTotal in July 2024 and began distribution in November 2024 as an .msi installer, extracting and executing the CleverSoar installer upon installation. 

The installer is designed to target users in China and Vietnam by leveraging fake software or gaming-related .msi installers to infect systems, but it terminates installation if the system language is not Chinese or Vietnamese, indicating a focused attack on these regions.

malicious files information

It shares similarities with the ValleyRAT campaign, suggesting a potential link to the same advanced threat actor, who demonstrates a deep understanding of Windows systems and security tools.

Best practices for API vulnerability & Penetration Testing -> Free Webinar

Deploying the Nidhogg rootkit and Winos4.0 framework disables security measures and selectively targets Chinese and Vietnamese systems to establish persistent backdoor access.

A malicious MSI package likely dropped payloads in “C:\Program Files (x86)\WindowsNT” and ran “Update.exe” with privilege escalation (T1134.002) if not already elevated (checked via GetTokenInformation), and then employs uncommon evasion techniques. 

The malware detects virtual environments by querying the system firmware table for the presence of the “QEMU” string, a common indicator of virtualization previously used by Raspberry Robin, which helps the malware evade analysis and detection.

CleverSoar Attack Flow

It bypasses Windows Defender’s emulator checks by using the `LdrGetDllHandleEx`, `RtlImageDirectoryEntryToData`, `NtIsProcessInJob`, and `NtCompressKey` functions, techniques documented in the UACME project, where successful bypass is logged, and the installer proceeds to the next check.

The malware installer verifies the operating system version using the ‘GetVersionExW’ function and checks for the presence of ‘Taskbar.dll’ to distinguish between Windows 10 and Windows 11 systems. 

By restricting non-Microsoft-signed binaries from injecting into processes, it modifies the process mitigation policy, thereby hindering the functionality of certain security solutions that rely on userland hooking techniques. 

It utilizes two anti-debug techniques: timing-based checks, measuring execution delays using ‘GetTickCount64’, and a simple presence check using the ‘IsDebuggerPresent’ API to detect if a debugger is attached to the process.

Process Termination call from Installer

The malware targets Chinese and Vietnamese systems, creates a registry key, enumerates running processes to identify security software, and attempts to inject malicious code into ‘lsass.exe’ to gain unauthorized privileges, likely for persistence or lateral movement. 

By creating a temporary service, it establishes a persistent ‘CleverSoar’ service, which in turn loads a malicious driver to compromise system security and then enumerates running processes to identify potential targets for further attacks.

According to Rapid7, the CleverSoar installer terminates competing processes, hides files, installs a rootkit, establishes persistence, disables the firewall, and deploys two malicious payloads: a Winos4.0 C2 implant and a custom backdoor, enabling communication with a C2 server.

Analyse Advanced Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks

As California grapples with devastating wildfires, communities are rallying to protect lives and property....

AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August...

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's...

FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches

The Federal Trade Commission (FTC) has announced that it will require GoDaddy Inc. to...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks

As California grapples with devastating wildfires, communities are rallying to protect lives and property....

AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August...

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's...