Tuesday, November 12, 2024
HomeCryptocurrency hackViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

Published on

Malware protection

ViperSoftX is an advanced malware that has become more complicated since its recognition in 2020, to the extent that eBooks are used on Torrent sites to spread across systems. 

Unlike other kinds of malware developers who mainly focus on developing new code instead of improving evasion techniques, ViperSoftX’s creators make use of various components from offensive security scripts.

Due to this, ViperSoftX is a major threat to users who want to have effective countermeasures.

- Advertisement - SIEM as a Service

It needs a significant comprehension of its infection chain, payload execution as well and stealth techniques for the development of strong preventive measures.

Are you from SOC/DFIR Teams? - Sign up for a free ANY.RUN account! to Analyse Advanced Malware Files

Cybersecurity researchers at Trellix recently discovered that the newest variant of the malware uses CLR (Common Language Runtime) to load PowerShell commands into AutoIt dynamically and, in turn, improves its own evasive abilities and for stealthy PowerShell execution.

ViperSoftX Weaponizing AutoIt & CLR

It all begins when victims download what looks to be a legitimate book from a rogue torrent.

This RAR archive contains hidden threats such as a folder, deceptive shortcut files, and scripts that pretend to be pictures.

Infection flow (Source – Trellix)

When the shortcut is run, it triggers a series of commands that uncover the hidden folder, name the sizes for the disk in a specific manner, create enduring Windows tasks, and drop hidden AutoIt scripts into the operating system.

Rar folder content (Source – Trellix)

This complex multi-stage attack leverages file obfuscation and automation to deploy malware while evading detection.

eBook torrent link (Source – Trellix)

Researchers said it leverages AutoIt’s ability to interact with the .NET CLR framework, enabling PowerShell command execution.

The malware employs advanced mechanisms to evade AMSI, decrypt multi-layered payloads, and collect information from the system to target cryptocurrency wallets.

Afterward, the data, including highly detailed user system information, is sent to its C2 server through false hostnames and Base64-encoded user agents.

Through this layered evasion technique and legitimate traffic blending, ViperSoftX can successfully penetrate targeted systems without detecting or stealing cryptocurrencies.

To send collected data to a remote server, the pOPSKX function establishes a web client, sets up headers, and sends an abnormal POST request with a content length of 0 for avoidance.

It then checks the “worker” header of the server to determine if there is a need for more work and whether the global worker variable should be true or false.

There are also Cloudflare services that obfuscate where the traffic comes from, making it impossible to trace.

The viperSoftx malware itself finds relevant information, takes note of it, and shares this data with command and control (C2) servers.

Then, it performs screen captures on screenshots in the Windows systems clipboard, looks for other payloads on the internet, runs reconnaissance tools or utilities against targets, and uses a self-destruction mechanism where necessary.

With CLR, PowerShell can be run in AutoIt to evade detection and patching Antimalware Scan Interface (AMSI).

Understanding ViperSoftX’s tactics and developing comprehensive defenses can mitigate its threat.

“Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!”- Free Demo

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...