The new malicious software, called “dotRunpeX”, is used to spread many famous families of malware, such as Agent Tesla, Ave Maria, Bitrat, Formbook, Lokibot, Netwire, Raccoon Stealer, Redline Stealer, Remcos, Rhadamanthys and Vidar.
“DotRunpeX is a new injector written on .NET using Process Hollowing technology. It is used by attackers to infect targeted systems with various well-known families of harmful programs,” says the comprehensive report of CheckPoint.
DotRunpeX samples studied by researchers are malicious in the second stage, often deployed through the bootloader, which is delivered to the victim’s computer through phishing emails in the form of malicious attachments.
In addition, it is known that attackers use in their campaign the harmful advertising of Google ADS. Such an advertisement redirects unsuspecting users looking for popular software by the AnyDesk and LastPass type, on sites on which Trojan installers are posted.
The Check Point analysis showed that “each sample of dotRunpeX has a built-in useful load of a certain family of malicious programs,” while a rigid list of operating system processes is spelled out in the injector, which automatically end with the activation of malicious software to avoid detection. And the latest dotRunpeX samples also use KoiVM virtualization means for these purposes.
Checkpoint specialists also found some signs that dotRunpeX can be associated with Russian-speaking hackers. This is indicated by the presence of the Cyrillic alphabet in the drivers used.
The most commonly distributed families of malicious programs delivered by a new threat include Redline, Raccoon, Vidar and Agent Tesla.
Checkpoint researchers predict the further development of dotRunpeX, including the addition of new functions, support for a larger number of malicious programs for implementation in the target system, as well as improved algorithms for detection.