Hackers Steal Cryptocurrencies Using DoubleFinger Malware Via Weaponized PIF Attachment

by Esmeralda McKenzie
Hackers Steal Cryptocurrencies Using DoubleFinger Malware Via Weaponized PIF Attachment

Hackers Steal Cryptocurrencies Using DoubleFinger Malware Via Weaponized PIF Attachment

Hackers Steal Cryptocurrencies The utilization of DoubleFinger Malware Thru Weaponized PIF Attachment

Stealing cryptocurrencies is a joint match, and a most up-to-date addition to this trend is the DoubleFinger loader, which is mostly designed to lift cryptocurrency through a pair of phases.

This most up-to-date addition, the DoubleFinger loader, is identified by the security researchers at Securelist.

Basically the main stage of DoubleFinger’s loading course of begins when the sufferer opens a contaminated PIF attachment in an electronic mail, inflicting DoubleFinger to be deployed on the focused machine.

In this case, Firms love Trustifi quit developed electronic mail threats That hear to Your alternate electronic mail with AI-Powered Electronic mail Security.

DoubleFinger Stage Prognosis

Right here below, we now private mentioned the total DoubleFinger phases:-

  • DoubleFinger stage 1
  • DoubleFinger stage 2
  • DoubleFinger stage 3
  • DoubleFinger stage 4
  • DoubleFinger stage 5

The “espexe.exe” binary undergoes several adjustments all during the initial stage, and the DialogFunc is namely patched to originate a malicious shellcode.

A PNG image from Imgur.com is downloaded by capability of shellcode after identifying the API functions added to DialogFunc the exhaust of their hash values.

yXTr Hg8ixkwmY gHdQVZABMyIM TqOm5kcTUQUSyFvf0D6sdd2G0YZ7hIuZw6YPOPliIcaQq Mj6yAeO tQ Q DrFDbMBpgoUOvWFMmrNdJPix4Anul4mkkR54 I2nWjmHFERZJ s8k2nYMWBUtm E
The aa.png file with embedded Stage 4

The image contains an encrypted payload which contains:-

  • A PNG with the fourth-stage payload
  • An encrypted knowledge blob
  • A legitimate java.exe binary
  • The DoubleFinger stage 2 loader

Execution of the Java binary file named msvcr100.dll, existing in the same directory because the stage 2 loader shellcode, is performed to load the 2d-stage shellcode.

The third-stage shellcode shows most valuable distinctions in contrast with the first and 2d phases.

To circumvent the hooks field by security solutions, the formula memory loads and maps ntdll.dll by the exhaust of low-level Windows API calls.

Following that, the decrypted fourth-stage payload existing in the PNG file is performed because the following step. For the reason that knowledge is retrieved from particular areas, it reveals that the steganography scheme unheard of is form of most valuable.

Basically the main motion is to identify the fifth stage within itself and then originate it the exhaust of the Path of “Doppelgänging” methodology.

To urge the GreetingGhoul stealer typically, the fifth stage creates a scheduled job that activates it at a notify time on on every day foundation foundation.

Many cybercriminals typically rely on Remcos, a famend commercial A ways flung Bring together admission to Trojan (RAT).

Victims & Attribution

Interior the malware, security experts at Securelist came upon substitute sections of text written in Russian.

Right here below, we now private mentioned the identified traces:-

  • A misspelled transliteration of the Russian phrase for “Greetings” in the initial portion of the C2 URL.
  • A string “salamvsembratyamyazadehayustutlokeretodlyagadovveubilinashusferu,” which states, “Greetings to all brothers, I’m suffocating here, locker is for bastards, you’ve tousled our blueprint of hobby.”

Whereas other than this, the victims which shall be primarily focused are from:-

  • Europe
  • The USA
  • Latin The united states

With their developed sophistication and skill in increasing crimeware, the DoubleFinger loader and GreetingGhoul malware would possibly be likened to APTs.

Looking For an All-in-One Multi-OS Patch Administration Platform – Try Patch Manager Plus

Source credit : cybersecuritynews.com

Related Posts