Security

Research

Cybercrooks get cozy with BoxedApp to dodge detection

Some of the biggest names in the game are hopping on the trend


Malware miscreants are increasingly showing a penchant for abusing legitimate, commercial packer apps to evade detection.

Jiří Vinopal, threat researcher at Check Point Research, says the trend has become especially popular over the past 12 months, and BoxedApp is one of the products that appear to be among the most favored.

Some of the most prevalent malware strains in the world are abusing BoxedApp to evade static analysis, the researcher claims. The vast majority are remote access trojans (RATs), such as Agent Tesla, AsyncRAT, and QuasarRat, although other cases have involved ransomware strains such as LockBit variants and infostealers such as Redline.

Chart depicts spike in malicious BoxedApp samples submitted to VirusTotal, courtesy of Check Point Research – click to enlarge

BoxedApp has been around for several years but the abuse of its SDK shot up from March 2023. It offers a range of benefits for attackers, a variety that Check Point Research believes outweigh the negatives.

Among the more notable features BoxedApp offers, ones that would interest bad actors especially are:

Application security expert Sean Wright told us: "The virtual processes may make it harder for anti-malware and other endpoint protection systems to detect the malware running via the BoxedApp SDK. Many of these products rely on the fact these processes run directly on the system as opposed to a virtualized process, which could then be hidden from the protection tooling.

"An easier way to perhaps think of this is a process running in a virtual machine, although it would likely be a bit more nuanced than this. So, from an attacker perspective, this helps prevent detection which would be one of their primary goals. The longer they go undetected the more data they could potentially gain access to."

BoxedApp programs do tend to generate a high false positive rate when scanned by antivirus solutions, according to Check Point Research. Even non-malicious apps packed using BoxedApp, such as a simple "Hello World" program, are flagged up by many antivirus engines, the report adds. 

An analysis of 1,200 genuinely malicious samples submitted to VirusTotal – the Google-owned malware platform that shows which vendors' solutions push alerts for different payloads – found that 25 percent were flagged up when packed using BoxedApp.

However, this can either be seen as a negative or a positive, depending on your outlook. While BoxedApp-packaged malware has a decent enough chance of triggering warnings in an organization's SOC, it can also play into attackers' hands as security teams may disable alerts relating to applications running the BoxedApp SDK.

"My advice to organizations is to limit the use of BoxedApp apps if possible," Wright said. "If you need to use these types of applications, look to leveraging controls such as signing of these applications, which as [Check Point Research's] writeup indicates can also help reduce the false positive rates."

Chart depicts malicious BoxedApp samples by country submitting to VirusTotal, courtesy of Check Point Research – click to enlarge

When looking deeper into the VirusTotal submissions, Vinopal found that the majority came from Turkey, the US, and Germany, although small percentages were reported from countries across the world.

"Most of the attributed malicious samples were used in attacks against financial institutions and government industries," the researcher blogged. "Using BoxedApp products to pack the malicious payloads enabled the attackers to lower the detection rate, harden their analysis, and use the advanced capabilities of BoxedApp SDK, e.g. Virtual Storage, that would normally take a long time to develop from scratch."

The Register approached BoxedApp for comment but it didn't immediately respond.

For those looking for ways to better detect abuses of BoxedApp, Check Point Research provides a set of Yara signatures in its report to help detect the packer while pulling out all the details and binary hashes of the packed app. ®

Send us news
2 Comments

Pixel perfect Ghostpulse malware loader hides inside PNG image files

Miscreants combine it with an equally tricky piece of social engineering

Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

US also charges an alleged Redline dev, no mention of an arrest

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'

Russian spies use remote desktop protocol files in unusual mass phishing drive

The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel

Microsoft says tougher punishments needed for state-sponsored cybercriminals

Although it also reaffirmed commitment to secure-by-design initiatives

Healthcare Services Group discloses 'cybersecurity incident' in SEC filing

Laundry and dining provider still investigating cause and scope

UK councils bat away DDoS barrage from pro-Russia keyboard warriors

Local authority websites downed in response to renewed support for Ukraine

LottieFiles supply chain attack exposes users to malicious crypto wallet drainer

A scary few Halloween hours for team behind hugely popular web plugin

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Samsung phone users under attack, Google warns

Don't ignore this nasty zero day exploit says TAG