Malware & RansomwareHIGH

Malware - New .NET AOT Malware Evades Detection with Scoring

SCSC Media
Summary by CyberPings EditorialΒ·AI-assistedΒ·Reviewed by Rohit Rana
Ingested:
🎯

Basically, a new type of malware hides better by checking if it's on a real computer or a test one.

Quick Summary

A new malware campaign using .NET AOT techniques has been discovered. It targets users through phishing emails and evades detection by evaluating system criteria. This poses serious risks to personal and organizational security. Stay informed and protect your systems.

What Happened

Researchers at Howler Cell have uncovered a sophisticated malware campaign that employs .NET Ahead-of-Time (AOT) compilation techniques. This innovative approach allows the malware to strip away metadata, making it challenging for standard security solutions to detect and analyze. The campaign typically starts with a phishing email that contains a malicious ZIP file. Once the user opens it, a file named KeyAuth.exe is executed, which acts as a downloader for the main orchestrator, bound_build.exe.

This orchestrator is responsible for decrypting and launching two additional threats: Crypted_build.exe, which deploys the Rhadamanthys infostealer, and Miner.exe, disguised as MicrosoftEdgeUpdater, which operates as a loader for the XMRig cryptocurrency miner. This multi-layered approach not only enhances the malware's functionality but also complicates detection efforts by security tools.

Who's Being Targeted

The primary targets of this malware campaign appear to be individuals and organizations that may fall victim to phishing attacks. By leveraging sophisticated scoring systems, the malware can distinguish between genuine targets and analysis environments. It evaluates various factors, including the amount of RAM (over 8GB), system uptime, the number of files in the Documents folder (more than 10), and the presence of antivirus processes like WinDefend or Kaspersky.

If the calculated score is below a threshold of 5, the malware self-terminates, effectively avoiding detection. This targeted approach increases the likelihood of successful infiltration into systems that meet its criteria, making it a significant threat.

Signs of Infection

Users may notice several signs of infection if they fall victim to this malware. The presence of unexpected processes such as KeyAuth.exe, bound_build.exe, or Miner.exe running on their systems can indicate an infection. Additionally, users may experience unusual system behavior, such as slow performance or unexpected network activity due to the cryptocurrency mining operations.

To further complicate matters, the malware's ability to self-terminate when it detects a non-target environment means that users may not always realize they have been compromised until it is too late. Regular monitoring of system performance and unusual file activity can help in early detection.

How to Protect Yourself

To safeguard against this evolving threat, users should adopt a multi-layered security approach. Here are some recommended actions:

  • Educate yourself and your team about phishing tactics to avoid falling victim to such attacks.
  • Implement robust antivirus solutions that can detect and mitigate advanced threats.
  • Regularly update software and operating systems to patch vulnerabilities that malware may exploit.
  • Monitor system performance and network activity for any unusual behavior that could indicate an infection.

By being proactive and vigilant, users can significantly reduce their risk of falling prey to this new .NET AOT malware campaign.

πŸ”’ Pro insight: This malware's scoring mechanism could inspire future threats, making behavioral detection increasingly critical for cybersecurity defenses.

Original article from

SCSC Media
Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security AffairsΒ·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security AffairsΒ·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro ResearchΒ·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC MediaΒ·
HIGHMalware & Ransomware

Chaos Malware - New Targeting of 64-bit Linux Servers

Chaos malware has evolved to target 64-bit Linux servers, expanding its attack surface. This shift raises alarms for organizations relying on these systems. Enhanced security measures are now crucial to protect against potential larger-scale attacks.

SC MediaΒ·
HIGHMalware & Ransomware

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

Cyber Security NewsΒ·