Tuesday, April 22, 2025
HomeCyber Security NewsViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

Published on

SIEM as a Service

Follow Us on Google News

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected to be Arabic speakers, have been distributing ViperSoftX malware to unsuspecting Korean users.

This operation has employed cracked software and torrents as vectors for spreading this dangerous malware, which often disguises itself as legitimate programs.

The exact method through which ViperSoftX is initially distributed remains shadowy.

- Advertisement - Google News

However, Arabic comments found within the PowerShell and VBS scripts used for Command and Control (C&C) communication suggest that the attackers are fluent in Arabic.

ViperSoftX Malware
 PowerShell script code

ViperSoftX has been known to masquerade as legitimate software, tricking users into downloading and installing it through fake programs or bundled with other software in torrents.

Operation and Secondary Payloads

The infection progresses as the PowerShell downloader fetches two sophisticated malware payloads: PureCrypter and Quasar RAT.

PureCrypter, a commercial .NET packer sold on underground forums since 2021, leverages Google’s Protocol Buffers (ProtoBuf) library for stealthy C&C communications.

It creates multiple executable files in the %ALLUSERSPROFILE% directory with names like “nvidia.exe” and “teamviewer.exe” to appear legitimate.

If found, it executes this file, which has the following responsibilities:

ViperSoftX Malware
VBS downloader

The final payload, Quasar RAT, is an open-source remote access tool that provides attackers with comprehensive control capabilities including keylogging, remote command execution, and file transfers.

Quasar establishes persistence with filenames like “winrar.exe” and “micro.exe” to evade detection through disguise as legitimate software.

“This campaign demonstrates sophisticated techniques to bypass security controls and maintain persistence,” noted ASEC researchers. “The use of multiple scripting stages and commercial malware tools indicates a well-resourced threat actor.”

Command and Control Infrastructure

The attackers are known to utilize IP addresses for communication and control:

IP Addresses:

  • 89.117.79.31: Used for initial communication, observed with ports 56005, 56004, and 56003.
  • 65.109.29.234: Observed with port 7702 for Quasar RAT communication.

Indicators of Compromise (IoCs)

Several Indicators of Compromise (IoCs) have been established for this campaign:

  • MD5 Hashes:
    • 05cbfc994e6f084f536cdcf3f93e476f
    • 4c6daef71ae1db6c6e790fca5974f1ca
    • 70e51709238385fd30ab427eb82e0836
    • 7d937e196962e3ebbbdee6d3a002f0cf
    • e5d6c58d17ebce8b0e7e089dfc60ff1a
  • IP Addresses:
    • 136.243.132.112: Possible C&C address
    • 65.109.29.234: C&C for Quasar RAT
    • 89.117.79.31: Primary C&C address

Monitoring these IPs and hashes provides the opportunity to identify and block the campaign at various stages.

To mitigate the risk of becoming a victim to such campaigns:

  • Avoid downloading software from unverified sources like torrent sites.
  • Use legitimate software acquisition methods.
  • Keep antivirus solutions updated and configured to scan downloads and installations.
  • Enable real-time protection and employ heuristic scanning to better detect previously unknown malware.

ASEC is actively monitoring this evolving threat and has already shared the above IoCs with the cybersecurity community to aid in defense measures.

Users are encouraged to stay informed and adopt stringent cybersecurity practices to prevent infection.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...