New Trojan.AutoIt.1443 Hits 28,000 Users via Game Cheats, Office Tool

In a recent discovery, cybersecurity experts from Dr.Web have unveiled a sophisticated cyber attack involving Trojan.AutoIt.1443, which is targeting approximately 28,000 users primarily in Russia and its neighboring countries. This malware campaign cleverly disguises itself as legitimate office applications, game cheats, and online trading bots, effectively infiltrating systems with cryptomining and cryptostealing malware.

The method of infection is particularly insidious, relying on unsuspecting users clicking on deceptive links shared across platforms like GitHub and YouTube. These links lead to downloads of password-protected archives that can evade basic antivirus detection. Once users enter the password, a series of files and scripts are extracted, paving the way for the malware’s installation.

YouTube videos involved in the malicious campaign (Credit: Dr.Web)

As detailed in Dr.Web’s technical blog, the malware’s operation hinges on several critical components. Among them is UnRar.exe, a legitimate application for opening RAR files, which is accompanied by scripts named Iun.bat and Uun.bat. These scripts work covertly to schedule tasks that facilitate the malware setup while simultaneously erasing traces of their activities.

Hidden within seemingly innocuous files such as ShellExt.dll and UTShellExt.dll lies a malicious script disguised as a standard system tool. This script, written in AutoIt—a programming language designed for Windows task automation—serves to help the malware blend seamlessly into the operating environment, thereby avoiding detection.

Malware Delivery and Execution

Upon activation, the malware conducts a scan for any debugging tools that could disrupt its operations. If it finds none, it establishes network access via the Ncat network utility, executing further files to entrench itself within the system. Additionally, it manipulates the system registry, utilizing the Image File Execution Options (IFEO) technique to maintain persistence.

This technique, typically employed by developers to redirect system processes for debugging purposes, is exploited by cybercriminals to execute malicious code each time system services or trusted applications, such as Chrome or Edge, undergo updates. This manipulation grants the malware control over essential system functions.

Cryptomining and Cryptostealing

The malware’s operations can be categorized into two primary malicious activities: cryptomining and cryptostealing. Initially, it utilizes a file named DeviceId.dll, masquerading as part of the .NET framework, to install a cryptomining program known as SilentCryptoMiner. This program operates silently on infected machines, leveraging their processing power to generate cryptocurrency for the attackers without the users’ awareness.

In parallel, the malware deploys a file called 7zxa.dll, which appears to be associated with the legitimate 7-Zip program but actually contains a “clipper” tool. This tool monitors the clipboard for cryptocurrency wallet addresses, swapping them with addresses controlled by the attackers, thereby diverting funds. To date, this technique has enabled the hackers to pilfer over ,000. Both malicious files are cleverly concealed within the system by injecting them into the Windows Explorer process, employing a stealthy method known as Process Hollowing, akin to Process Doppelgänging.

Widespread Impact and Prevention Measures

The Trojan.AutoIt.1443 campaign has cast a wide net, impacting over 28,000 users, predominantly in Russia, but also extending to Belarus, Kazakhstan, and Turkey. Many victims fell prey to the allure of pirated software, underscoring the dangers associated with downloading applications from unverified sources.

To mitigate the risks associated with such threats, users are encouraged to:

  • Utilize reputable antivirus solutions.
  • Download software exclusively from trusted sources.
  • Regularly update security software to identify the latest threats.
  • Steer clear of pirated programs, as they often harbor malicious files.

As cyber threats continue to evolve, it is imperative for users to remain vigilant and adhere to safe computing practices to safeguard their systems. Staying informed about the latest threats and security measures is crucial in this ever-changing digital landscape.

Related Topics

  1. Fake League of Legends Download Ads Drop Lumma Stealer
  2. Global malspam targets hotels, spreading Redline, Vidar stealers
  3. Fake Windows site dropped Redline malware as Windows 11 upgrade
  4. Fake CAPTCHA Verification Pages Spreading Lumma Stealer Malware
  5. Ransomware Hidden as a Game: Kransom’s Attack Via DLL Side-Loading
Tech Optimizer
New Trojan.AutoIt.1443 Hits 28,000 Users via Game Cheats, Office Tool