ViperSoftX malware covertly runs PowerShell using AutoIT scripting

In order to avoid detection, the most recent versions of the info-stealing virus ViperSoftX load and perform PowerShell commands within AutoIt scripts using the common language runtime (CLR).

The CLR is an essential part of Microsoft’s.NET Framework, acting as the runtime environment and execution engine for.NET programs.

To load code into AutoIt, a scripting language used by security solutions to automate Windows tasks, ViperSoftX leverages the CLR syntax.

Researchers also discovered that the malware’s creator added more sophisticated malicious scripts to the most recent iterations of the program.

Since at least 2020, ViperSoftX has been in circulation. It is now found on torrent sites in the form of ebooks that contain malicious RAR archives including a shortcut (.LNK) file, PowerShell and AutoIT scripts hidden as JPG image files, and a bogus PDF or ebook file.

Files in the RAR archive
Source: Trellix

According to malware researchers at cybersecurity firm Trellix, victims run the.LNK file to begin the infection. The PowerShell script that conceals instructions that are automatically run in the Command Prompt is loaded during the procedure.

The PS script moves to the %APPDATA%\Microsoft\Windows directory two files (zz1Cover2.jpg and zz1Cover3.jpg). One of them is the executable for AutoIt and renamed AutoIt3.exe.

The same script sets up the Task Scheduler to launch AutoIt3.exe every five minutes following the user’s login in order to preserve persistence.

Scheduled tasks added by ViperSoftX
Source: Trellix

In order to blend in with normal system operations and avoid discovery, ViperSoftX loads and runs PowerShell commands within the AutoIt environment utilizing CLR.

AutoIT does not support.NET CLR natively, but users can build functions that enable indirect PowerShell command invocation. This makes it possible.

ViperSoftX conceals the commands in the PowerShell scripts derived from the picture decoy files using a combination of strong Base64 obfuscation and AES encryption.

In order to get beyond security checks on the scripts, the virus also contains a function called “AmsiScanBuffer” that modifies the memory of the Antimalware Scan Interface (AMSI) function.

ViperSoftX attack flow
Source: Trellix

ViperSoftX uses misleading hostnames, such as “security-microsoft.com,” for network connection. System data is transmitted via a POST request with a content length of “0,” encoded in the Base64 format to avoid detection. By doing this, the threat actor attempts once more to deflect attention from the absence of physical content.

ViperSoftX wants to take advantage of vulnerable systems to steal the following information:

  • Hardware and system specifications
  • cryptocurrency wallet information from numerous browser addons, including MetaMask and Ronin Wallet
  • contents of the clipboard
ViperSoftX checking the browser extensions
Source: Trellix

According to Trellix, ViperSoftX has improved its evasion strategies and grown more dangerous. The virus avoids detection by security measures that usually detect independent PowerShell activity by leveraging CLR to run PowerShell inside AutoIt.

The malware, according to the researchers, is a modern, highly skilled danger that can be neutralized with “a comprehensive defense strategy that encompasses detection, prevention, and response capabilities.”

Leave a Reply

Your email address will not be published. Required fields are marked *

Next Post

The Granblue Fantasy Versus: Rising gameplay clip unveiled Vikala and Sandalphon.

Sun Jul 21 , 2024
The content for Granblue Fantasy Versus: Rising is almost over for its first season, but more is still planned. Cygames released Vikala as the final character of their Granblue Rising season pass and Sandalphon for Character Pass 2 after their finals at Evo 2024 concluded today. In addition, the publisher […]

You May Like