Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware

Cybercriminals are increasingly turning legitimate software installer frameworks, such as Inno Setup, into tools for distributing malware. Originally intended to facilitate software deployment on Windows, Inno Setup has gained popularity among malicious actors due to its trusted appearance and robust Pascal scripting capabilities.

This sophisticated misuse allows attackers to conceal malware within seemingly innocuous installation packages, often slipping past user scrutiny and even evading some antivirus solutions.

Exploiting Trust in Software Distribution Tools

A recent campaign highlighted by the Splunk Threat Research Team (STRT) illustrates how these malicious installers can deliver information-stealing malware, such as RedLine Stealer, through a complex multi-stage infection process. This begins with a malicious Inno Setup installer that employs Pascal scripting to execute various evasion techniques, including the detection of debuggers and sandbox environments.

The script utilizes XOR encryption to obscure critical strings and conducts Windows Management Instrumentation (WMI) queries to identify malware analysis tools and virtual machine settings, terminating the process if any such conditions are detected.

List of Malware Analysis Tools

Upon passing these checks, the installer retrieves a compressed payload from a command-and-control (C2) server via a TinyURL link, often concealed behind access-restricted pages on platforms like rentry[.]org.

TinyURL Destination link

A Multi-Stage Malware Delivery Chain

Once the payload is downloaded, it is extracted from a ZIP archive using a renamed 7-Zip utility. A scheduled task is then created to ensure persistence by launching a hidden executable upon system reboot.

This payload initiates a series of complex actions involving DLL sideloading, where a trojanized QtGuid4.dll decrypts shellcode from an encrypted file, ultimately loading HijackLoader. Known for its modular design and evasion techniques like Heaven’s Gate and Process Hollowing, HijackLoader decrypts and injects the final payload, RedLine Stealer, into a legitimate MSBuild.exe process. This allows it to steal sensitive information, including browser credentials and cryptocurrency wallet data.

RedLine Stealer further complicates detection through “constant unfolding” obfuscation, dynamically constructing parameters at runtime, and employing browser flags like –no-sandbox in Chrome to disable security features. It also launches Internet Explorer with extensions disabled to carry out malicious actions unnoticed.

This campaign exemplifies the sophisticated exploitation of trusted tools, as attackers leverage Inno Setup’s legitimacy to distribute malware through phishing, cracked software, or compromised updates.

The STRT has developed multiple detection methods to identify such threats, focusing on indicators like unsigned DLL sideloading, hidden scheduled tasks, and suspicious browser behaviors.

As cybercriminals continue to refine their tactics, utilizing legitimate frameworks for malicious purposes, both users and organizations must remain vigilant. Employing robust endpoint security and monitoring is essential to detect and mitigate these stealthy threats before they compromise critical data.

Indicators of Compromise (IOC)

Description Hash
Malicious Inno Setup Loader Hash 1 0d5311014c66423261d1069fda108dab33673bd68d697e22adb096db05d851b7
Malicious Inno Setup Loader Hash 2 0ee63776197a80de42e164314cea55453aa24d8eabca0b481f778eba7215c160
Malicious Inno Setup Loader Hash 3 12876f134bde914fe87b7abb8e6b0727b2ffe9e9334797b7dcbaa1c1ac612ed6
Malicious Inno Setup Loader Hash 4 8f55ad8c8dec23576097595d2789c9d53c92a6575e5e53bfbc51699d52d0d30a

Exclusive Webinar Alert: Harnessing Intel® Processor Innovations for Advanced API Security – Register for Free

Tech Optimizer
Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware