DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware distributes a diverse range of other malware strains.
Cybersecurity researchers at Check Point recently revealed the real-world use and campaign-related infection paths of DotRunpeX malware after closely monitoring and observing the DotRunpeX malware.
Additionally, the researchers confirmed in a report they submitted to Cyber Security News that the DotRunpeX malware injector is developing and evolving quickly.
The new version of dotRunpeX is powered by the following features.
Иисус.sys
translated as “jesus.sys”Malware families delivered by DotRunpeX
Here below, we have mentioned all the malware families that DotRunpeX delivers:
DotRunpeX often follows the initial infection via distinct .NET loaders in phishing emails or disguised utility sites. It exploits Google Ads and targets rivals with trojanized malware builder tools.
The users who are already searching for the following popular software were redirected by this injector to fake cloned and malicious websites mimicking this software by exploiting Google Ads:
Beyond usual infection routes, a unique DotRunpeX case emerged; a DotRunpeX user targeted both regular victims and potential adversaries using a trojanized Redline builder (Redline_20_2_crack.rar) with hidden DotRunpeX as ‘extra’.
Apart from this, a customized version of the KoiVM virtualizer protects the new version of DotRunpeX, and it’s highly configurable.
While the most notable similarity between the new and old ones is their 64-bit executable files, they inject various types of malware families.
DotRunpeX evades the AV solutions using “procexp.sys” to close the protected process handles. It also effectively kills all the active Anti-Malware services.
With ongoing evolution, the DotRunpeX injector is gaining features steadily, attracting increasing attention from security analysts and threat actors.
Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware
A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage tool…
The United States has suspended offensive cyber operations against Russia under an order issued by…
Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging Google Ads and PayPal’s infrastructure to…
A new campaign involving the notorious remote access trojan (RAT) Njrat has been uncovered, leveraging…
Security researchers have uncovered new evidence that North Korean threat actors, particularly the Lazarus Group,…
Security researchers have uncovered five significant vulnerabilities in Paragon Partition Manager's BioNTdrv.sys driver, affecting versions…