Wednesday , Sept. 25, 2024, 12:03 p.m.
News thumbnail
Technology / Thu, 30 May 2024 BleepingComputer

Pirated Microsoft Office delivers malware cocktail on systems

Cybercriminals are distributing a malware cocktail through cracked versions of Microsoft Office promoted on torrent sites. The malware delivered to users includes remote access trojans (RATs), cryptocurrency miners, malware downloaders, proxy tools, and anti-AV programs. Microsoft Office to malwareThe cracked Microsoft Office installer features a well-crafted interface, letting users select the version they want to install, the language, and whether to use 32 or 64-bit variants. 3Proxy : Converts infected systems into proxy servers by opening port 3306 and injecting them into legitimate processes, allowing attackers to route malicious traffic. : Converts infected systems into proxy servers by opening port 3306 and injecting them into legitimate processes, allowing attackers to route malicious traffic.

Cybercriminals are distributing a malware cocktail through cracked versions of Microsoft Office promoted on torrent sites.

The malware delivered to users includes remote access trojans (RATs), cryptocurrency miners, malware downloaders, proxy tools, and anti-AV programs.

AhnLab Security Intelligence Center (ASEC) has identified the ongoing campaign and warns about the risks of downloading pirated software.

The Korean researchers discovered that the attackers use multiple lures, including Microsoft Office, Windows, and the Hangul Word Processor, which is popular in Korea.

Microsoft Office to malware

The cracked Microsoft Office installer features a well-crafted interface, letting users select the version they want to install, the language, and whether to use 32 or 64-bit variants.

The malicious installer's interface

Source: ASEC

However, in the background, the installer launches an obfuscated .NET malware that contacts a Telegram or Mastodon channel to receive a valid download URL from where it will fetch additional components.

The URL points to Google Drive or GitHub, both legitimate services that are unlikely to trigger AV warnings.

The base64 payloads hosted on those platforms contain PowerShell commands that introduce a range of malware strains to the system, unpacked using 7Zip.

Fetching and unpacking malware components

Source: ASEC

The malware component 'Updater' registers tasks in the Windows Task Scheduler to ensure it persists between system reboots.

According to ASEC, the following types of malware are installed by the malware on the breached system:

Orcus RAT : Enables comprehensive remote control, including keylogging, webcam access, screen capture, and system manipulation for data exfiltration.

: Enables comprehensive remote control, including keylogging, webcam access, screen capture, and system manipulation for data exfiltration. XMRig : Cryptocurrency miner that uses system resources to mine Monero. It halts mining during high resource usage, such as when the victim is gaming, to avoid detection.

: Cryptocurrency miner that uses system resources to mine Monero. It halts mining during high resource usage, such as when the victim is gaming, to avoid detection. 3Proxy : Converts infected systems into proxy servers by opening port 3306 and injecting them into legitimate processes, allowing attackers to route malicious traffic.

: Converts infected systems into proxy servers by opening port 3306 and injecting them into legitimate processes, allowing attackers to route malicious traffic. PureCrypter : Downloads and executes additional malicious payloads from external sources, ensuring the system remains infected with the latest threats.

: Downloads and executes additional malicious payloads from external sources, ensuring the system remains infected with the latest threats. AntiAV: Disrupts and disables security software by modifying its configuration files, preventing the software from operating correctly and leaving the system vulnerable to the operation of the other components.

Even if the user discovers and removes any of the above malware, the 'Updater' module, which executes upon system launch, will re-introduce it.

The attack chain

Source: ASEC

Users should be cautious when installing files downloaded from dubious sources and generally avoid pirated/cracked software.

Similar campaigns have been used to push STOP ransomware, which is the most active ransomware operation targeting consumers.

As these files are not digitally signed and users are prepared to ignore antivirus warnings when running them, they are often used to infect systems with malware, in this case, an entire set.

logo

Stay informed with the latest news and updates from around India and the world.We bring you credible news, captivating stories, and valuable insights every day

©All Rights Reserved.