The AhnLab Security Intelligence Center (ASEC) has reported that ViperSoftX malware, first identified in 2020, continues to pose a significant threat, particularly targeting cryptocurrency-related information. It disguises itself as cracked software or eBooks on torrent sites and uses deceptive tactics to infect users globally. ViperSoftX exploits the Windows Task Scheduler to execute malicious PowerShell scripts and communicates with its command-and-control server to transmit detailed system information. The malware captures clipboard activity to steal cryptocurrency wallet addresses and employs mechanisms to avoid detection, including self-removal. It also deploys secondary payloads like Quasar RAT and ClipBanker, which hijacks wallet addresses during transactions. ASEC warns that infections can lead to total system compromise and advises users to avoid unverified downloads and maintain updated security measures.
Indicators of Compromise (IOCs):
- MD5:
- 064b1e45016e8a49eba01878e41ecc37
- 0ed2d0579b60d9e923b439d8e74b53e1
- 0efe1a5d5f4066b7e9755ad89ee9470c
- 197ff9252dd5273e3e77ee07b37fd4dd
- 1ec4b69f3194bd647639e6b0fa5c7bb5
- URLs:
- http://136.243.132.112/ut.exe
- http://136.243.132.112:881/3.exe
- http://136.243.132.112:881/APPDATA.exe
- http://136.243.132.112:881/a.ps1
- http://136.243.132.112:881/firefoxtemp.exe
- IPs:
- 136.243.132.112
- 160.191.77.89
- 185.245.183.74
- 212.56.35.232
- 89.117.79.31