A threat actor has been observed using a complex and powerful malware loader dubbed Verblecon with the ultimate goal of deploying cryptocurrency miners on compromised systems and potentially facilitating the theft of Discord tokens.
Evidences shows that the attacker’s goal was to install cryptocurrency mining software on the victims’ machines. said researchers from the Symantec Threat Hunter team.
There are also indications that the attacker may be stealing Discord tokens and using these to advertise Trojanized videogame applications.
This would appear to be a relatively low reward goal for the attacker, given the level of effort that would have been required to develop this sophisticated malware.
Verblecon, Initially detected a year back, with the payload incorporating polymorphic qualities to evade signature-based detection by software. security.
The loader performs AV security checks to determine if it is currently being debugged or opened in a virtual or sand boxed environment, before proceeding to copy to the machine and connect to a remote server to retrieve a encrypted blob containing a URL, which is then used to get the payloads from the miner.
If used by sophisticated threat actors there is a possibility that this could be used for more serious attacks, including potentially ransomware and espionage campaigns.
Indicators of Compromise