CyberSecurityNews

Malware Campaign Uses JavaScript, PowerShell, and Shellcode to Deliver Crypto Clipper


A wave of well-crafted malware is quietly draining cryptocurrency from users across the globe, and the attackers behind it have gone to great lengths to stay hidden.

Researchers have uncovered a large-scale campaign built around a multi-stage loader called CountLoader, which chains together JavaScript, PowerShell, and shellcode to deliver a payload that intercepts and redirects cryptocurrency transactions.

The scope of this campaign is striking, with tens of thousands of machines now infected across multiple continents. The malware does not rely on a single trick.

It starts with a malicious EXE file that runs a PowerShell command, pulling down an obfuscated JavaScript loader and executing it through mshta.exe, a legitimate Windows utility that attackers frequently abuse because the operating system trusts it by default.

This lets the malware blend into normal activity, giving it time to settle in before any defenses can respond.

Analysts at McAfee Labs, who authored the research and shared details in a report with Cyber Security News (CSN), noted that the campaign reached roughly 86,000 unique infected machines.

On average, around 5,000 infected systems were connecting to command-and-control infrastructure every single minute. Infections were highest in India, followed by Indonesia and the United States, with a strong presence across Southeast Asia.

Beyond internet-based delivery, the malware also spreads through USB drives. When instructed by its command server, CountLoader replaces files on connected external drives with LNK shortcut files.

Malware Campaign Deliver Crypto Clipper

Opening one silently runs the malware while also opening the original file, so victims notice nothing unusual. About 9,000 infections were traced back to this USB-based method.

The end goal is a cryptocurrency clipper. Once loaded into memory, it monitors the clipboard in the background.

The moment a user copies a wallet address, the clipper replaces it with one controlled by the attacker, silently rerouting funds with no visible warning to the victim.

The infection chain is designed to avoid detection at every stage. After the initial EXE runs, a scheduled task fires every 30 minutes to maintain persistence from the very first step.

Infection Chain (Source – McAfee)

The PowerShell script then decodes a Base64 payload and runs it using Invoke-Expression, a common technique for executing hidden code without writing anything to disk.

CountLoader then takes control as an HTA file loaded through mshta.exe. It hides its window, attempts to erase its own file if run locally, and cycles through command servers until one responds.

Once connected, it performs an encrypted handshake, grabs a JWT token, and sends back details about the infected host, including any installed cryptocurrency wallets or browser extensions.

The next stages involve a PowerShell packer that decrypts and launches a shellcode injector. Before injecting, the script disables AMSI, a Windows feature designed to catch malicious scripts, using a known public bypass.

The shellcode then loads the final payload directly into memory under systeminfo.exe, never touching the disk, making it significantly harder for security tools to detect.

Cryptocurrency Clipper Delivered via EtherHiding

What sets the final payload apart is how it locates its command server. Rather than hard-coding a domain that can be blocked or taken down, the clipper uses a technique called EtherHiding, fetching the server address straight from the Ethereum blockchain.

Since the blockchain is decentralized, there is no single point defenders can shut down to cut the malware off.

Global Distribution of CountLoader Infections (Source - McAfee)
Global Distribution of CountLoader Infections (Source – McAfee)

Once the server address is retrieved, the clipper silently monitors clipboard contents and supports multiple cryptocurrency formats, meaning it can swap Bitcoin, Ethereum, and other wallet addresses without the victim noticing.

Researchers measured the true scale of this campaign by registering a backup C2 domain and sinkholing infected traffic to their own server, effectively turning the attackers’ infrastructure against them.

To reduce risk, users should avoid running EXE files from untrusted sources, treat unknown USB drives with caution, and always verify wallet addresses before sending cryptocurrency.

Watching for unfamiliar scheduled tasks on Windows and keeping security software updated can also help detect this threat before serious damage is done.

Indicators of Compromise (IoCs):-

TypeIndicatorDescription
File Hash (SHA256)5f9ff671955a6d551595f9838aed063c496da5039be0d222fe84f96cb3e1d32aEXE Stage 1
URLhttps://memory-scanner[.]cc/Presentation[.]pdfPowerShell Stage 2 download URL
File Hash (SHA256)3c278499c5e3ced3bf1a6a7287808c5267075f1dec0aa5c7be2c4c444f33f2bcPowerShell Stage 2 script
URLhttps://memory-scanner[.]cc/CountLoader download URL
URLhttps://hell1-kitty[.]cc/update1_usb_usb_usb[.]VOcx4wEV8CountLoader download URL
File Hash (SHA256)c68e436d4cb984db026210806f50d0c81eec5f6e4860197dab91fab6f31ef796CountLoader v3.3
File Hash (SHA256)e2faad8111e7d47349cbc549b85e62231b8678057906bc813aad7242fa95ae63CountLoader v4.1
File Hash (SHA256)e5e1d8ec4cd109df290752ee3d4b2cbc9de6df4360e9983548f1bc6b1d088540CountLoader v4.1
Domainhell1-kitty[.]ccCountLoader C2 domain
Domainalphazero1-endscape[.]ccCountLoader C2 domain
Domainapi-microservice-us1[.]comCountLoader C2 domain
Domainbucket-aws-s1[.]comCountLoader C2 domain
Domainbucket-aws-s2[.]comCountLoader C2 domain
Domainfileless-storage-s3[.]ccCountLoader C2 domain
Domainglobalsnn1-new[.]ccCountLoader C2 domain
Domainglobalsnn2-new[.]ccCountLoader C2 domain
Domainglobalsnn3-new[.]ccCountLoader C2 domain
Domainhandle-me-sv1[.]comCountLoader C2 domain
Domainhardware-office[.]ccCountLoader C2 domain
Domainhealth-smooth-eu1[.]comCountLoader C2 domain
Domainhealth-smooth-eu2[.]comCountLoader C2 domain
Domainhealth-smooth-eu3[.]comCountLoader C2 domain
Domainholiday-updateservice[.]comCountLoader C2 domain
Domainmemory-protection-layer1[.]ccCountLoader C2 domain
Domainmemory-protection-layer2[.]ccCountLoader C2 domain
Domainmicroservice-update-s1-bucket[.]ccCountLoader C2 domain
Domainmicroservice-update-s2-bucket[.]ccCountLoader C2 domain
Domainmy-smart-house1[.]comCountLoader C2 domain
Domainpolystore9-servicebucket[.]ccCountLoader C2 domain
Domains3-updatehub[.]ccCountLoader C2 domain
File Hash (SHA256)10593dbe9edfde7943fdaadd7882f190216b2f6502667daf701088a6e810deafUSB LNK file
File Hash (SHA256)0a69a9cc75d65774e5eb90a4a739bd4335d33b176dc4923acb691bd45af66bdfUSB LNK file
File Hash (SHA256)27c6a6bda2c0ef3ecb78dad9c6bb7c3abaf2e32b3ad96f372a0102c0c9c0f08dUSB LNK file
File Hash (SHA256)2cd449f1bb24f05d2e240812a74bd62f2583bbbe4d0ccc9ae5736240e29a0068USB LNK file
File Hash (SHA256)30dcd5c71beb76d2f8df768d5fd9e9145cb8fbbfc951a63b969d26d3b64002b9USB LNK file
File Hash (SHA256)dd4c7f5aae404816cf447b8090b620c1a1971a35c6791116aa3f871f00ae011bUSB LNK file
File Hash (SHA256)42a1fc74334c9a3b8720c79df55f84c7398bd31609eb10581e8c7155835498e3USB LNK file
File Hash (SHA256)9c0d334aac5a6f66016dc5ce8df75c46d519a4e6d16c68cf2b1405c81189186dUSB LNK file
File Hash (SHA256)44f6313e9542c0d51937a70160fe4137012905d8c79ad27ccc0021788ecfaa4eUSB LNK file
URLhttps://hell1-kitty[.]cc/gamecenter[.]fileManagerPayload launcher URL
URLhttps://hardware-office[.]cc/foundation[.]halflifePayload launcher URL
File Hash (SHA256)cbdfb46b9265a3dfb3bc6b0aade472dde28b1660dbd3ded3b67b1530b4497ccaPayload launcher
File Hash (SHA256)4a5e1d6ee1217e1fbacf54fc6017fbf9d24a25078266b02358d56a9c7437ceb7PowerShell packer
File Hash (SHA256)05becb67d8bf1e49fcfccb0d346b82368a2b1c2bf07316078c364c7b020154deShellcode injector
File Hash (SHA256)44daa1b68737b55a711963eec211c7c018bcba4cb6d68c286a4b45ea781a7d73Shellcode
File Hash (SHA256)dc602cb53a9c24abfcdaadf0ca8256b5fb5cac6d91d20ed8431bdaaf51c0cafeFinal clipper payload
URLhttps://edr-security-bucket1[.]cc/Payload C2 server URL

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.



Source link