Monday, February 17, 2025
Homecyber securityGHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections

GHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections

Published on

SIEM as a Service

Follow Us on Google News

Recent campaigns targeting victims through social engineering tactics utilize LUMMA STEALER with GHOSTPULSE as its loader.

By tricking victims into executing a series of Windows keyboard shortcuts, malicious JavaScript is executed, leading to the execution of a PowerShell script. 

The script downloads and executes a GHOSTPULSE payload, which is now a single executable file containing the encrypted configuration within its resources section. This simplifies the malware’s deployment process.

Large embedded PNG file in the resources section
Large embedded PNG file in the resources section

It has undergone a significant update, primarily affecting its configuration retrieval method, where previously, it would extract encrypted data from a PNG file by searching for specific markers and tags, which involved sequentially parsing the file and extracting chunks based on matching identifiers. 

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

The new version implements a more complex approach, likely involving different hashing algorithms and data structures to locate and retrieve the configuration.

This approach aims to enhance the malware’s resilience against detection and analysis, making it more difficult to track and mitigate its impact.

Pseudocode code comparison between old and new algorithm
Pseudocode code comparison between old and new algorithm

The malware encrypts its configuration within the pixels of an image, which extracts the RGB values from each pixel to construct a byte array.

By iterating through the byte array in 16-byte blocks and comparing CRC32 hashes, the malware locates the encrypted GHOSTPULSE configuration. 

It then extracts the configuration’s offset, size, and XOR key. It decrypts it using the XOR algorithm, effectively hiding the malware’s configuration within the image, making it more difficult to detect and analyze.

visual breakdown of the process
visual breakdown of the process

Researchers enhanced the configuration extractor to accommodate both GHOSTPULSE versions, which refined the tool to process PNG files and extract their embedded payloads. 

The updated YARA rules for GHOSTPULSE detection, released by Elastic Security, are designed to identify the malware’s second stage of infection, which will be incorporated into Elastic Defend in a future update, focusing on specific byte sequences within the malware’s executable. 

Rule Windows_Trojan_GHOSTPULSE_1 targets unique byte patterns found in the second stage, while rule Windows_Trojan_GHOSTPULSE_2 identifies a specific sequence of instructions related to the malware’s execution flow.

These rules effectively prevent the malware from completing its malicious activities by detecting these patterns.

The GHOSTPULSE malware family has undergone significant evolution since its 2023 debut, as the recent update represents a major overhaul, demanding adaptive countermeasures from defenders. 

The landscape of cyber threats is constantly shifting, and to keep up with the changes, collaboration and innovation are still necessary for secure protection.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks

Telekom Security has recently uncovered a significant vishing (voice phishing) campaign targeting individuals and...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...