New ModiLoader Malware Campaign Targets Windows PCs, Harvesting User Credentials

New ModiLoader Malware Campaign Targets Windows PCs, Harvesting User Credentials

AhnLab Security Intelligence Center (ASEC) has recently uncovered a malicious campaign distributing ModiLoader (also known as DBatLoader) malware through phishing emails.

These emails, crafted in Turkish and impersonating a Turkish bank, urge recipients to open a malicious attachment under the guise of checking their transaction history.

Inside the compressed RAR file lies a BAT script that initiates a multi-stage infection process, ultimately deploying SnakeKeylogger, a potent infostealer malware developed in .NET. SnakeKeylogger is notorious for exfiltrating sensitive data such as system information, keyboard inputs, and clipboard content via methods like email, FTP, SMTP, or Telegram.

– Advertisement –

This campaign exemplifies the growing sophistication of phishing attacks and the urgent need for heightened cybersecurity awareness.

ModiLoader Trojan
Email body

Phishing Emails Distribute Dangerous Malware

The infection begins with the BAT script, which creates and executes a Base64-encoded DBatLoader binary (x.exe) in the Windows Temp directory.

DBatLoader then orchestrates a series of obfuscated and decrypted BAT scripts (5696.cmd, 8641.cmd, and neo.cmd) alongside malicious files like svchost.pif and netutils.dll to evade detection.

ModiLoader Trojan
DBatLoader decrypting the bat script

Notably, the malware employs DLL side-loading by disguising a malicious program as svchost.pif, mimicking the legitimate easinvoker.exe process, and loading a rogue netutils.dll to execute harmful behaviors.

Additional evasion tactics include copying legitimate system tools like cmd.exe and powershell.exe under disguised names (alpha.pif and xkn.pif) and manipulating Windows Defender exclusion paths to bypass security scans.

Credential Theft Mechanisms

Once evasion is achieved, DBatLoader injects SnakeKeylogger into a legitimate process disguised as wxiygomE.pif, a module of the mercurymail program.

SnakeKeylogger then harvests user credentials and transmits the stolen data to a threat actor-controlled Telegram bot, as revealed by the specific configuration token embedded in the malware.

This intricate chain of exploitation, leveraging legitimate processes and advanced obfuscation, makes detection incredibly challenging for standard antivirus solutions, posing a severe risk to individual users and organizations alike.

The ModiLoader campaign highlights the cunning use of legitimate Windows processes and tools-such as cmd.exe, powershell.exe, esentutl.exe, and extrac32.exe-for malicious purposes like file manipulation and policy changes.

This malware’s ability to blend into normal system operations underscores the importance of proactive security measures.

Users are strongly advised to exercise caution with email attachments, especially those prompting script execution, and to ensure their security software is up to date.

As phishing remains a primary vector for such threats, maintaining a strong sense of cybersecurity hygiene is critical to preventing infection.

The ASEC report serves as a stark reminder of the evolving threat landscape and the need for continuous vigilance against malware designed to steal sensitive information.

Indicators of Compromise (IOC)

Type Value
MD5 7fa27c24b89cdfb47350ecfd70e30e93
MD5 a0a35155c0daf2199215666b00b9609c
URL https://api.telegram.org/bot8135369946:AAEGf2H0ErFZIOLbSXn5AVeBr_xgB-x1Qmk/sendDocument?chat_id=7009913093

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link