Cyber Security News

Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

In August 2024, researchers detected a malicious Google Chrome browser infection that led to the distribution of LummaC2 stealer malware that utilized a drive-by download of a ZIP archive containing an MSI app packaging file, which, when executed, installed the malicious software on the victim’s system.

A MSI file communicates with a remote server to obtain the password required to extract a malicious DLL from a RAR archive and employs a legitimate executable associated with cryptographic tools to decrypt the archive.

The malicious executable, located in the “TroxApp” folder, uses DLL sideloading to load the harmful “rnp.dll” payload, exploiting the Windows operating system’s behavior of searching for DLL files in specific directories, allowing the malicious executable to execute malicious code.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The malicious DLL triggered a loader process that downloaded the LummaC2 stealer and then executed a PowerShell command to fetch the next-stage payload, “02074.bs64,” from the C2 server at two-root[.]com/02074.bs64 and decrypt it using two rounds of XOR operations.

The overview of the PowerShell command and the decrypted next-stage payload

A malicious Chrome extension “Save to Google Drive” installs LummaC2 malware and can handle financial transactions for Facebook, Coinbase, and Google Pay accounts.

It can set and get account balances, generate addresses, and initiate cryptocurrency withdrawals by sending JSON data containing transaction details.

The extension collects hardware and system data, browser information, and cookies, generates a unique device identifier, and sends all this information to a remote server.

Retrieving machine information

While a malicious browser extension injects code to open invisible popups containing URLs from C2 servers.

The script monitors these popups for content related to payments, logins, and ad management, potentially stealing user input or manipulating displayed content.

It targets email platforms (Outlook, Gmail, Yahoo Mail) by injecting and manipulating web content based on configurations, which allows it to potentially alter email contents, raising concerns about stealing sensitive data like 2FA verification codes

Function responsible for the modification of the email body content

The “makeScreenShot” function in “proxy.js” captures a screenshot of the active tab in a compromised Chrome browser, encodes it as a base64 string, and sends it to a command-and-control server, which enables the attackers to monitor the victim’s browsing activity and potentially steal sensitive information.

According to eSentire, the malicious actors employed a DLL side-loading technique to deploy a LummaC2 stealer and a Chrome extension, which worked in tandem to extract Bitcoin addresses from blockchain and mempool URLs, subsequently decoding them using Base58 to steal sensitive information.

Download Free Incident Response Plan Template for Your Security Team – Free Download

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Google Patches Multiple Chrome Security Vulnerabilities

Google has released several security patches for its Chrome browser, addressing critical vulnerabilities that malicious…

9 mins ago

Grayscale Investments Data Breach Exposes 693K User Records Reportedly Affected

Grayscale Investments, a prominent crypto asset manager, has reportedly suffered a data breach affecting 693,635…

20 hours ago

Threat Actors Allegedly Selling Database of 1,000 NHS Email Accounts

A database containing over 1,000 email accounts associated with the National Health Service (NHS) has…

20 hours ago

Mallox Ransomware Vulnerability Lets Victims Decrypt Files

Researchers from Avast have uncovered a vulnerability in the cryptographic schema of the Mallox ransomware,…

22 hours ago

Red Hat NetworkManager Flaw Allows Hackers to Gain Root Access

A recently discovered vulnerability in Red Hat's NetworkManager, CVE-2024-8260, has raised concerns in the cybersecurity…

23 hours ago

Tor Browser 14.0 Released With New Android Circuit Options

Tor Browser 14.0 has been officially launched. It brings significant updates and new features to…

1 day ago