MalVirt – Dropping .Net InfoStealers
Malvertising campaigns are dropping .NET info-stealing malware dubbed MalVirt. These are highly obfuscated and distributed as virtualized .NET loaders.
MalVirt uses signatures and countersignatures from Microsoft, Acer, Digicert, Sectigo, and several other companies to avoid detection. That said, these signatures are invalid or are created using invalid certificates and hence get flagged on most systems.
The malware sends data to multiple random decoy C2 servers hosted with different providers, including Azure, Tucows, Choopa and Namecheap.
As for system execution, the dropper uses KoiVM virtualization as an obfuscation method. Once it reaches the target system, it drops an info stealer malware of the Formbook family. This distribution through the MalVirt loader “is characterized by an unusual amount of applied anti-analysis and anti-detection techniques”.
The Formbook family includes Formbook and its newer version Xloader. These are info-stealing malware with capabilities including keylogging, screenshot theft, and the ability to steal web and other credentials, and can act as a staging platform for additional malware as well. Xloader can also heavily disguise its C2 traffic.
While its traditionally delivered as an attachment with phishing emails, this new distribution method indicates just how much threat actors have adapted to Microsoft’s decision to block macros by default in Word, Excel, and PowerPoint to shut down a commonly abused attack vector. LNK files as well as ISO and RAR attachments are also being used as attack vectors now.
Malvertising is becoming increasingly popular among threat actors who are now frequently abusing Google Ads to trick unsuspecting users into downloading malware. This is done by redirecting users to a fake site and letting them download a fake version of a popular program which includes malware droppers.
The campaign was discovered by SentinelOne researchers during a routine Google ad search for Blender 3D, a popular open-source 3D designing program.
Indicators of Compromise