February 9, 2022 By David Bisson 2 min read

Threat actors leveraged a malicious Telegram installer to infect users with the Purple Fox rootkit.

A case study in evasion

With the help of MalwareHunterTeam, Minerva Labs looked into a malicious Telegram installer and found that it was a compiled AutoIt script called ‘Telegram Desktop.exe.’

The script created a new folder and dropped both a legitimate Telegram installer and a malicious downloader into it. The former didn’t factor into the attack chain. The same can’t be said about the latter, however.

Upon execution, the malicious downloader contacted a command and control (C&C) server and downloaded two files into a newly created folder. One of those resources, ‘7zz.exe,’ contained another file called ‘ojbke.exe’ that, when run with the ‘-a’ argument, reflectively loaded a DLL file.

This item led the attack flow to use some more files for the purpose of shutting down antivirus processes. It was then that the campaign took advantage of its C&C server to gather the hostname, CPU and other information from a victim.

It also checked to see if various antivirus solutions were running on the victim’s machine. At that point, the campaign delivered all that data to the C&C server.

The server was down at the time of Minerva Labs’ analysis. But upon reviewing the IP address, the researchers found that the attack concluded by downloading and running Purple Fox. Further review revealed that malicious installers were delivering the same rootkit via email, presumably from phishing websites.

Other recent attack attempts involving Purple Fox

The attack campaign discussed above wasn’t the first time that the Purple Fox rootkit made news in the past few years. In September 2019, researchers witnessed the RIG exploit kit sending out a new Purple Fox variant. The threat used one of three methods to redirect visitors to a malicious PowerShell command for the purpose of installing the rootkit.

In 2021, Guardicore Labs detected an active malware campaign targeting Windows machines. This operation differed from previous attacks involving Purple Fox in that it didn’t leverage phishing emails or exploit kits. Instead, it used SMS password brute forcing, a tactic which enabled the rootkit to propagate as a worm across web-facing Windows machines.

How to defend against Purple Fox attack attempts

Businesses can defend against the Purple Fox attack attempts discussed above by investing in their anti-phishing measures. Those defenses include using awareness training to cultivate employees’ knowledge of new phishing attack campaigns. They also consist of using URL blocking, spam controls, multifactor authentication and other technical defensive measures.

At the same time, businesses and agencies need to minimize the risk of attackers using exploit kits and SMS vulnerabilities to infect them with threats like Purple Fox. They can do this by prioritizing and remediating vulnerabilities affecting their systems using a vulnerability management program.

More from News

DHS awards significant grant to improve tribal cybersecurity

4 min read - The Department of Homeland Security (DHS) has awarded $18.2 million in grants through the Tribal Cybersecurity Grant Program to boost cybersecurity defenses among Native American Indian Tribes. The program takes a big step in addressing the unique digital threats faced by tribal communities — a dedicated effort to improve cybersecurity infrastructure across these regions. The $18.2 million grant is just one component of DHS's broader strategy to enhance national cybersecurity. Administered by the Federal Emergency Management Agency (FEMA) in partnership…

ONCD releases request for information: Open-source software security

3 min read - Open-source software is a collective partnership across the development community that requires both private and public buy-in. However, securing open-source software can be tricky. With so many different people working on the coding, security measures are often overlooked, increasing the chances that a vulnerability will fall through the cracks and be exploited. The Open-Source Software Security Initiative (OS31) aims to provide governance over open-source security processes. After the Log4Shell vulnerability, securing open-source software became a top priority for the federal…

3,000 “ghost accounts” on GitHub spreading malware

3 min read - In the past, cyber criminals directly distributed malware on GitHub using encrypted scripting code or malicious executables. But now threat actors are turning to a new tactic to spread malware: creating ghost accounts. A highly effective malware campaign Check Point Research recently exposed a new distribution-as-a-service (DaaS) network, referred to as the Stargazers Ghost Network, that has been spreading malware on GitHub for at least a year. Because the accounts perform typical activities as well, users did not realize that…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today