AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected to be Arabic speakers, have been distributing ViperSoftX malware to unsuspecting Korean users.
This operation has employed cracked software and torrents as vectors for spreading this dangerous malware, which often disguises itself as legitimate programs.
The exact method through which ViperSoftX is initially distributed remains shadowy.
However, Arabic comments found within the PowerShell and VBS scripts used for Command and Control (C&C) communication suggest that the attackers are fluent in Arabic.
ViperSoftX has been known to masquerade as legitimate software, tricking users into downloading and installing it through fake programs or bundled with other software in torrents.
The infection progresses as the PowerShell downloader fetches two sophisticated malware payloads: PureCrypter and Quasar RAT.
PureCrypter, a commercial .NET packer sold on underground forums since 2021, leverages Google’s Protocol Buffers (ProtoBuf) library for stealthy C&C communications.
It creates multiple executable files in the %ALLUSERSPROFILE% directory with names like “nvidia.exe” and “teamviewer.exe” to appear legitimate.
If found, it executes this file, which has the following responsibilities:
The final payload, Quasar RAT, is an open-source remote access tool that provides attackers with comprehensive control capabilities including keylogging, remote command execution, and file transfers.
Quasar establishes persistence with filenames like “winrar.exe” and “micro.exe” to evade detection through disguise as legitimate software.
“This campaign demonstrates sophisticated techniques to bypass security controls and maintain persistence,” noted ASEC researchers. “The use of multiple scripting stages and commercial malware tools indicates a well-resourced threat actor.”
The attackers are known to utilize IP addresses for communication and control:
IP Addresses:
Several Indicators of Compromise (IoCs) have been established for this campaign:
Monitoring these IPs and hashes provides the opportunity to identify and block the campaign at various stages.
To mitigate the risk of becoming a victim to such campaigns:
ASEC is actively monitoring this evolving threat and has already shared the above IoCs with the cybersecurity community to aid in defense measures.
Users are encouraged to stay informed and adopt stringent cybersecurity practices to prevent infection.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due to…
Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost savings.…
Security awareness has become a critical component of organizational defense strategies, particularly as companies adopt…
Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking" (WTH),…
The global regulatory landscape for cybersecurity is undergoing a seismic shift, with the European Union’s…
A sophisticated new malware suite targeting macOS, dubbed "PasivRobber," has been discovered by security researchers.…