Special Features

Malware Month

ViperSoftX variant spotted abusing .NET runtime to disguise data theft

Freeware AutoIt also used to hide entire PowerShell environments in scripts


A rapidly-changing infostealer malware known as ViperSoftX has evolved to become more dangerous, according to security researchers at threat detection vendor Trellix.

ViperSoftX, first spotted in 2020, has recently reemerged with the ability to use the .NET Common Language Runtime (CLR) to obfuscate its use of PowerShell commands, wrote Trellix security scrutineers Mathanraj Thangaraju and Sijo Jacob. The pair suggest those commands are further disguised by hiding them within scripts generated by freeware program AutoIt.

The result is a seriously nasty piece of malware that manages to run PowerShell commands in a hidden environment.

CLR is also known as the .NET runtime, and allows software coded in various compatible languages to run as .NET apps as managed code.

"By utilizing CLR, ViperSoftX can seamlessly integrate PowerShell functionality, allowing it to execute malicious functions while evading detection mechanisms that might otherwise flag standalone PowerShell activity," Thangaraju and Jacob said of the latest variant of the infostealer.

Microsoft didn't respond to questions for this story.

A well-hidden chain

Previously found hiding in cracked software and pirated apps, this latest CLR-capable version of ViperSoftX has instead been spotted among pirated eBooks being distributed over torrents.

While this might not seem like a huge risk to enterprises that block known pirating sites, the sample Trellix included in its report is from a bootleg copy of an Excel formula cookbook, suggesting professionals working in enterprise environments are being considered as targets.

Regardless of who its makers intends to infect, ViperSoftX has been developed to avoid notice while making off with system information, cryptocurrency wallet details (and the coins they contain), clipboard contents and other such data.

According to Trellix's examination of the malware's code, ViperSoftX buries command sequences in a series of fake JPG files that install AutoIt scripts, the AutoIt executable and PowerShell scripts. Those, in turn, set up a series of scheduled Windows tasks, some of which act to disable Windows security features like the Antimalware Scan Interface (AMSI), which checks all scripts before execution.

Other scripts used in the attack chain are further obfuscated, "making it challenging for security solutions" to identify what's actually going on, Trellix’s analysis states.

"In examining ViperSoftX, a clear pattern emerges: attackers use AutoIt scripts to hide their malicious actions," in an operation through which "AutoIt transcends its benign origins and becomes a potent weapon for secretly executing PowerShell commands."

AutoIt is a freeware scripting language for automating Windows GUI actions and other scripting commands, and it isn't malicious in and of itself. AutoIt isn't the only legitimate tool that's been repurposed by ViperSoftX developers, either.

"ViperSoftX also employs a strategy where attackers selectively adapt components from offensive security scripts, modifying only the necessary elements," the duo noted.

"By leveraging these existing scripts, malware developers not only accelerate development but also focus on improving their evasion tactics, making ViperSoftX a formidable threat in the cybersecurity landscape."

It's not immediately clear if AutoIt's developers are aware of the misuse of their software or will be able to mitigate it with a patch; we asked but haven't heard back.

Thangaraju and Jacob suggested that ViperSoftX's capabilities suggest a new wave of sophisticated and agile malware threats is breaking. The pair suggest defending against this sort of weapon requires understanding the objective of malware like ViperSoftX.

Trellix, however, didn’t attribute the malware to any particular source, or respond to questions from The Register.

Previous reports on ViperSoftX have focused on its cryptocurrency-stealing features to suggest its objective was purely to do with monetary gain. Its latest obfuscation features, and at least partial targeting of professionals with bootleg eBook downloads, suggest ViperSoftX's goals could be evolving, just like its code.

Detection details are included in Trellix's report on this latest ViperSoftX variant, so be sure to review them accordingly. ®

Send us news
3 Comments

Pixel perfect Ghostpulse malware loader hides inside PNG image files

Miscreants combine it with an equally tricky piece of social engineering

Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

US also charges an alleged Redline dev, no mention of an arrest

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Here's a NIS2 compliance checklist since no one cares about deadlines anymore

Only two EU members have completed the transposition into domestic law

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'

Penn State pays DoJ $1.25M to settle cybersecurity compliance case

Fight On, State? Not this time

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites

Also, new EU cyber reporting rules are live, exploiters hit the gas pedal, free PDNS for UK schools, and more

Russian spies use remote desktop protocol files in unusual mass phishing drive

The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel

Delta officially launches lawyers at $500M CrowdStrike problem

Legal action comes months after alleging negligence by Falcon vendor

Microsoft says tougher punishments needed for state-sponsored cybercriminals

Although it also reaffirmed commitment to secure-by-design initiatives

UK councils bat away DDoS barrage from pro-Russia keyboard warriors

Local authority websites downed in response to renewed support for Ukraine