Malicious Actors Exploit SoraAI’s Popularity & GitHub to Distribute Malware

Malicious Actors Exploit SoraAI's Popularity & GitHub to Distribute Malware

Threat actors are leveraging the growing popularity of OpenAI’s Sora, a cutting-edge video generation model, to distribute malicious software.

Disguised as a legitimate shortcut file named “SoraAI.lnk,” this information-stealing malware mimics the branding of Sora to trick users into initiating a multi-stage attack chain.

Deceptive Tactics Target OpenAI’s Sora Brand

First reported on VirusTotal from Vietnam on May 21, 2025, the malware has since spread to multiple countries, though the exact number of affected individuals remains unclear.

– Advertisement –

This campaign highlights the increasing use of social engineering tactics to exploit user trust in well-known AI tools, with attackers hosting their malicious payloads on trusted platforms like GitHub to evade suspicion.

The attack begins when a user double-clicks the “SoraAI.lnk” shortcut, which triggers a connection to cmd.exe with a predefined argument, launching a hidden PowerShell process.

This process downloads a malicious batch file, “a.bat,” from a GitHub repository into the victim’s Temp folder.

SoraAI
Github repository

The script then executes a looped download attempt for additional payloads, ensuring persistence even if initial attempts fail.

Subsequent stages involve the execution of further batch files, “f.bat” and “1.bat,” which orchestrate the installation of legitimate Python packages like requests, pywin32, and cryptography, ultimately running a malicious Python script, “python.py.”

This script establishes persistence by placing itself in the startup folder and targets a wide array of sensitive data.

Multi-Stage Attack Chain

It extracts browser cookies, passwords, and profiles from applications like Chrome, Firefox, and Opera, decrypting encrypted data using a custom “chrome_decrypt.dll.”

Additionally, it collects system information, Wi-Fi credentials via the netsh tool, cryptocurrency wallet details, and configuration data from popular gaming platforms such as Steam and Epic Games.

The harvested data is compressed into a zip file, named with the victim’s country and IP, and exfiltrated via a Telegram bot API.

SoraAI
.lnk argument

For larger files exceeding 49MB, the malware uploads them to the external hosting service GoFile.io, notifying attackers through Telegram while deleting local traces to cover its tracks.

This intricate attack chain also scavenges files with common extensions (.pdf, .jpg, .txt) and data from critical directories like Downloads and Documents, amplifying the potential damage to victims through identity theft or further exploitation.

As the digital landscape continues to evolve, distinguishing between legitimate and malicious resources becomes paramount.

Users must exercise caution by downloading files exclusively from trusted sources and verifying file authenticity before execution, as damage from such malware is often irreversible once initiated.

Staying informed about cyberattack methodologies and deploying robust antivirus solutions like K7 Total Security can significantly mitigate risks.

According to the Report, K7 Labs, for instance, offers detection capabilities for such information stealers at various infection stages.

Indicators of Compromise (IOCs)

File Name Hash
SoraAI.lnk D4B1F86B0D722935BDA299D37F7A2663
a.bat 8358AF316ACDFD449D9E9F78FFC57500
f.bat 596C75805BE5AD3B44A0AAFA9E94DFC2
1.bat BE13272715927422332A14DBFE32CFF7
python.py 9BABDE0DD32C1AB24EFB2C4D25BD0B10
chrome_decrypt.dll ED38E7C7E54B87841BDB013203EBF01B
URL hxxp[://github.com/ArimaTheH/a/raw/refs/heads/main/f.zip

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link