New Windows Subsystem For Linux Malware Steals Credentials & Record Keystrokes

There has been an increasing amount of interest in targeting the Windows Subsystem for Linux (WSL), due to the fact that they continue to develop new malware, as hackers continue to analyze WSL for potential exploits. 

Having such a sample available for espionage purposes and for the downloading of extra malicious components would be acceptable. By using WSL, native Linux binaries are operated on Windows as if the Linux kernel were emulating the operating system.

It has been discovered that there have been several WSL-based malware samples on the loose that are derived from open-source. The threat actor is able to connect to the compromised system remotely through Telegram, via which they are able to send messages to the compromised system.

Tools & Modules

Here below we have mentioned all the tools and modules used:-

  • “Keyjeek” Keylogger Utilizing Gmail
  • Shellcode Injector
  • Stub.py Stager
  • “Lee” Agent
  • DiscordRAT
  • Discord Token Grabber
  • Keylogger
  • Telegram-Based Bot
  • Password Dumper Module

Technical Analysis

Security researchers at Lumen Technologies’ Black Lotus Labs have reported that it was almost a year ago that the malicious binaries for WSL were first spotted.

During the past several years, the number of variants has grown steadily, and despite the fact that all of them are based on publicly available code, they suffer from low detection rates.

Since the last fall, more than 100 samples of malware based on WSL have been tracked by Black Lotus Labs researchers. Two of them stand out from the rest due to their abilities to function as RAT or to generate a reverse shell on the infected host, among many other features they possess.

RAT-via-Telegram Bot was one of the most recent examples of using Python-based open-source software to provide it with the control. 

The bot, which is available for the Google Chrome and Opera web browsers, allows for manual control of Telegram, the ability to steal authentication cookies, as well as the ability to run commands and download files with ease.

Live bot tokens and chat IDs were included in the malware, which indicated that it had an active mechanism of command and control.

The second WSL-based malware sample which has recently been discovered uses a reverse TCP shell to communicate with an attacker on a computer that has been infected with it.

In addition, both malware pieces are capable of downloading files with the purpose of extending their functionality and have the capability to be used for espionage purposes.

When it comes to defending your network against WSL-based threats, the general recommendation is to closely monitor the activity of the system in order to spot suspicious activities.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector emerged…

11 hours ago

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its attacks…

11 hours ago

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6 million…

12 hours ago

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect servers…

13 hours ago

Healthcare Sector Becomes a Major Target for Cyber Attacks in 2025

The healthcare sector has emerged as a prime target for cyber attackers, driven by the…

13 hours ago

SysAid ITSM Vulnerabilities Enables Pre-Auth Remote Command Execution

Security researchers have disclosed a chain of critical vulnerabilities affecting SysAid ITSM’s On-Premise solution, enabling…

14 hours ago