Article Details

Scrape Timestamp (UTC): 2024-07-10 06:31:27.358

Source: https://www.theregister.com/2024/07/10/vipersoftx_malware_dot_net/

Original Article Text

Click to Toggle View

ViperSoftX variant spotted abusing .NET runtime to disguise data theft. Freeware AutoIt also used to hide entire PowerShell environments in scripts. A rapidly-changing infostealer malware known as ViperSoftX has evolved to become more dangerous, according to security researchers at threat detection vendor Trellix. ViperSoftX, first spotted in 2020, has recently reemerged with the ability to use the .NET Common Language Runtime (CLR) to obfuscate its use of PowerShell commands, wrote Trellix security scrutineers Mathanraj Thangaraju and Sijo Jacob. The pair suggest those commands are further disguised by hiding them within scripts generated by freeware program AutoIt. The result is a seriously nasty piece of malware that manages to run PowerShell commands in a hidden environment. CLR is also known as the .NET runtime, and allows software coded in various compatible languages to run as .NET apps as managed code. "By utilizing CLR, ViperSoftX can seamlessly integrate PowerShell functionality, allowing it to execute malicious functions while evading detection mechanisms that might otherwise flag standalone PowerShell activity," Thangaraju and Jacob said of the latest variant of the infostealer. Microsoft didn't respond to questions for this story. A well-hidden chain Previously found hiding in cracked software and pirated apps, this latest CLR-capable version of ViperSoftX has instead been spotted among pirated eBooks being distributed over torrents. While this might not seem like a huge risk to enterprises that block known pirating sites, the sample Trellix included in its report is from a bootleg copy of an Excel formula cookbook, suggesting professionals working in enterprise environments are being considered as targets. Regardless of who its makers intends to infect, ViperSoftX has been developed to avoid notice while making off with system information, cryptocurrency wallet details (and the coins they contain), clipboard contents and other such data. According to Trellix's examination of the malware's code, ViperSoftX buries command sequences in a series of fake JPG files that install AutoIt scripts, the AutoIt executable and PowerShell scripts. Those, in turn, set up a series of scheduled Windows tasks, some of which act to disable Windows security features like the Antimalware Scan Interface (AMSI), which checks all scripts before execution. Other scripts used in the attack chain are further obfuscated, "making it challenging for security solutions" to identify what's actually going on, Trellix’s analysis states. "In examining ViperSoftX, a clear pattern emerges: attackers use AutoIt scripts to hide their malicious actions," in an operation through which "AutoIt transcends its benign origins and becomes a potent weapon for secretly executing PowerShell commands." AutoIt is a freeware scripting language for automating Windows GUI actions and other scripting commands, and it isn't malicious in and of itself. AutoIt isn't the only legitimate tool that's been repurposed by ViperSoftX developers, either. "ViperSoftX also employs a strategy where attackers selectively adapt components from offensive security scripts, modifying only the necessary elements," the duo noted. "By leveraging these existing scripts, malware developers not only accelerate development but also focus on improving their evasion tactics, making ViperSoftX a formidable threat in the cybersecurity landscape." It's not immediately clear if AutoIt's developers are aware of the misuse of their software or will be able to mitigate it with a patch; we asked but haven't heard back. Thangaraju and Jacob suggested that ViperSoftX's capabilities suggest a new wave of sophisticated and agile malware threats is breaking. The pair suggest defending against this sort of weapon requires understanding the objective of malware like ViperSoftX. Trellix, however, didn’t attribute the malware to any particular source, or respond to questions from The Register. Previous reports on ViperSoftX have focused on its cryptocurrency-stealing features to suggest its objective was purely to do with monetary gain. Its latest obfuscation features, and at least partial targeting of professionals with bootleg eBook downloads, suggest ViperSoftX's goals could be evolving, just like its code. Detection details are included in Trellix's report on this latest ViperSoftX variant, so be sure to review them accordingly.

Daily Brief Summary

MALWARE // ViperSoftX Malware Hides Using .NET and AutoIt, Targets Professionals

ViperSoftX, an infostealer malware first identified in 2020, has resurfaced with enhanced capabilities, now utilizing the .NET runtime to obfuscate malicious PowerShell commands.

This latest variant leverages AutoIt, a legitimate freeware, to further conceal its activity by embedding malicious scripts within what appear to be benign scripts and applications.

Trellix researchers have discovered that this version of ViperSoftX is distributed through pirated eBooks, indicating a shift towards targeting professionals, particularly those using enterprise environments.

The malware is capable of stealing system data, cryptocurrency wallets, clipboard contents, and more, while actively avoiding detection by disabling Windows security features like the Antimalware Scan Interface (AMSI).

ViperSoftX utilizes complex obfuscation techniques including burying command sequences in fake JPG files, which install malicious scripts and configure scheduled tasks to diminish system defenses.

The techniques employed signify a new wave of sophisticated malware threats aimed at both evading detection and enhancing the effectiveness of their attacks.

Trellix has not attributed the development or spread of ViperSoftX to any specific actor or group, indicating the malware's usage is broadly targeted for financial gain.