Threat actors leveraged a malicious Telegram installer to infect users with the Purple Fox rootkit.
A Case Study in Evasion
With the help of MalwareHunterTeam, Minerva Labs looked into a malicious Telegram installer and found that it was a compiled AutoIt script called ‘Telegram Desktop.exe.’
The script created a new folder and dropped both a legitimate Telegram installer and a malicious downloader into it. The former didn’t factor into the attack chain. The same can’t be said about the latter, however.
Upon execution, the malicious downloader contacted a command and control (C&C) server and downloaded two files into a newly created folder. One of those resources, ‘7zz.exe,’ contained another file called ‘ojbke.exe’ that, when run with the ‘-a’ argument, reflectively loaded a DLL file.
This item led the attack flow to use some more files for the purpose of shutting down antivirus processes. It was then that the campaign took advantage of its C&C server to gather the hostname, CPU and other information from a victim.
It also checked to see if various antivirus solutions were running on the victim’s machine. At that point, the campaign delivered all that data to the C&C server.
The server was down at the time of Minerva Labs’ analysis. But upon reviewing the IP address, the researchers found that the attack concluded by downloading and running Purple Fox. Further review revealed that malicious installers were delivering the same rootkit via email, presumably from phishing websites.
Other Recent Attack Attempts Involving Purple Fox
The attack campaign discussed above wasn’t the first time that the Purple Fox rootkit made news in the past few years. In September 2019, researchers witnessed the RIG exploit kit sending out a new Purple Fox variant. The threat used one of three methods to redirect visitors to a malicious PowerShell command for the purpose of installing the rootkit.
In 2021, Guardicore Labs detected an active malware campaign targeting Windows machines. This operation differed from previous attacks involving Purple Fox in that it didn’t leverage phishing emails or exploit kits. Instead, it used SMS password brute forcing, a tactic which enabled the rootkit to propagate as a worm across web-facing Windows machines.
How to Defend Against Purple Fox Attack Attempts
Businesses can defend against the Purple Fox attack attempts discussed above by investing in their anti-phishing measures. Those defenses include using awareness training to cultivate employees’ knowledge of new phishing attack campaigns. They also consist of using URL blocking, spam controls, multifactor authentication and other technical defensive measures.
At the same time, businesses and agencies need to minimize the risk of attackers using exploit kits and SMS vulnerabilities to infect them with threats like Purple Fox. They can do this by prioritizing and remediating vulnerabilities affecting their systems using a vulnerability management program.