Sunday, June 1, 2025
HomeCyber Security NewsBeware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

Published on

SIEM as a Service

Follow Us on Google News

In August 2024, researchers detected a malicious Google Chrome browser infection that led to the distribution of LummaC2 stealer malware that utilized a drive-by download of a ZIP archive containing an MSI app packaging file, which, when executed, installed the malicious software on the victim’s system.

A MSI file communicates with a remote server to obtain the password required to extract a malicious DLL from a RAR archive and employs a legitimate executable associated with cryptographic tools to decrypt the archive.

The malicious executable, located in the “TroxApp” folder, uses DLL sideloading to load the harmful “rnp.dll” payload, exploiting the Windows operating system’s behavior of searching for DLL files in specific directories, allowing the malicious executable to execute malicious code.

- Advertisement - Google News

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The malicious DLL triggered a loader process that downloaded the LummaC2 stealer and then executed a PowerShell command to fetch the next-stage payload, “02074.bs64,” from the C2 server at two-root[.]com/02074.bs64 and decrypt it using two rounds of XOR operations.

The overview of the PowerShell command and the decrypted next-stage payload 

A malicious Chrome extension “Save to Google Drive” installs LummaC2 malware and can handle financial transactions for Facebook, Coinbase, and Google Pay accounts.

It can set and get account balances, generate addresses, and initiate cryptocurrency withdrawals by sending JSON data containing transaction details.

The extension collects hardware and system data, browser information, and cookies, generates a unique device identifier, and sends all this information to a remote server.

Retrieving machine information 

While a malicious browser extension injects code to open invisible popups containing URLs from C2 servers.

The script monitors these popups for content related to payments, logins, and ad management, potentially stealing user input or manipulating displayed content.

It targets email platforms (Outlook, Gmail, Yahoo Mail) by injecting and manipulating web content based on configurations, which allows it to potentially alter email contents, raising concerns about stealing sensitive data like 2FA verification codes

Function responsible for the modification of the email body content 

The “makeScreenShot” function in “proxy.js” captures a screenshot of the active tab in a compromised Chrome browser, encodes it as a base64 string, and sends it to a command-and-control server, which enables the attackers to monitor the victim’s browsing activity and potentially steal sensitive information.

According to eSentire, the malicious actors employed a DLL side-loading technique to deploy a LummaC2 stealer and a Chrome extension, which worked in tandem to extract Bitcoin addresses from blockchain and mempool URLs, subsequently decoding them using Base58 to steal sensitive information.

Download Free Incident Response Plan Template for Your Security Team – Free Download

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...