ClickFix Malware-Kampagne: Fake-Cloudflare-Check installiert unbemerkt MIMICRAT

ClickFix Malware-Kampagne verteilt MIMICRAT über Fake-Cloudflare-Seiten mit fünfstufiger Infektionskette, AMSI-/ETW-Bypass und HTTPS-C2.

TARNKAPPE.INFO
Stealka Stealer: Fake-Roblox-Mods und Cheats plündern Krypto-Wallets

Stealka Stealer ist eine neue Windows-Malware, die sich als Roblox-Mod oder Cheat tarnt und Browserdaten sowie Krypto-Wallets plündert.

TARNKAPPE.INFO

😱 Siete al sicuro? Un nuovo malware sfrutta l'automazione di Windows per rubare i tuoi dati sensibili. Aggiorna il tuo antivirus e fai attenzione! #CyberSecurity #WindowsMalware

🔗 https://www.tomshw.it/hardware/coyote-primo-malware-che-sfrutta-windows-ui-2025-07-25

Questo malware sfrutta un'automazione di Windows per rubarvi i dati

Il malware Coyote sfrutta Windows UI Automation per rubare credenziali bancarie, colpendo utenti di 75 banche e piattaforme crypto.

Tom's Hardware
Dissecting Windows Malware Series – Beginner To Advanced – Part 1 - 8kSec

In Part-1 of Dissecting Windows Malware blog series, we’ll lay down the foundations of analysing and reverse engineering Windows malicious files.

8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.

Elastic Security Labs analyzed a Windows dataset of over 100,000 malicious files: https://www.elastic.co/security-labs/unveiling-malware-behavior-trends

#windowsmalware #elastic #MalwareBehavior

Globally distributed stealers — Elastic Security Labs

This article describes our analysis of the top malware stealer families, unveiling their operation methodologies, recent updates, and configurations. By understanding the modus operandi of each family, we better comprehend the magnitude of their impact and can fortify our defences accordingly.

Interesting #windowsmalware tactic: redirecting malicious* code in from standard input rather than using a file or via args.
This means I can not (as easily) see what is being executed.
This is not new (I have played around with this tactic in the past, albit with bash rather than PowerShell). However, I have not seen this used before in the wild

i.e.

powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -

* as I can not see the code, I can not say for sure what it does or if it is malware

PSA to Windows users: C:\ProgramData\WindowsTask is NOT a legitimate Windows folder and is in fact malware
#WindowsMalware #IOC #filepathIOC

🔍 Technical Analysis: Smoke Loader Malware Leveraging Wi-Fi Access Points for Geolocation

📅 Date: August 28, 2023
🖋️ Author: Eswar

📌 Tags: #Malware #SmokeLoader #Geolocation #Wi-FiScanning #Cybersecurity

🛠️ The Smoke Loader malware, recently discovered, employs a novel technique to locate infected systems through Wi-Fi access points and Google's Geolocation API. This technical analysis sheds light on the key mechanisms used by this malware.

🔗 System Location Identification:
The malware, also known as "Whiffy Recon," utilizes a custom Wi-Fi scanning tool to identify an infected system's precise coordinates using nearby Wi-Fi access points. This is achieved by leveraging the Windows WLANSVC service and Google's Geolocation API.

🔒 Infection Process:
The malware checks the existence of the WLANSVC service, regardless of its operational status. If the service exists, the malware creates a wlan.lnk shortcut in the Startup folder pointing to the malware's original location. On the other hand, if the service is absent, the malware terminates execution.

🔄 Malware Loops:
There are two loops in the malware's execution flow:

  • The first loop checks for the presence of the file %APPDATA%\wlan\str-12.bin. If valid parameters are found, the malware proceeds to the next loop for Wi-Fi scanning.
  • In the absence of the file, the malware registers the bot with the Command and Control (C2) server, sending a JSON payload in an HTTPS POST request with a hard-coded UUID for bot identification.
  • 📥 Registration and Communication:
    Upon successful registration, the server responds with a secret UUID, replacing the initial bot ID for future requests. Both UUIDs are stored in the str-12.bin file. The malware then scans for Wi-Fi access points using the Windows WLAN API, sending results to Google's Geolocation API via HTTPS POST requests.

    🌐 Google Geolocation API:
    The Geolocation API provides system coordinates based on Wi-Fi access points and mobile network data. The obtained coordinates are integrated into a JSON structure along with encryption methods of access points. This data is sent to the C2 server through HTTP POST requests with Authorization UUID and specific URLs.

    🔎 Indicators of Compromise:

    Whiffy Recon sample dropped by Smoke Loader

    • MD5 hash: 009230972491f5f5079e8e86e19d5458
    • SHA256 hash: 935b44784c055a897038b2cb6f492747c0a1487f0ee3d3a39319962317cd4087

    Whiffy Recon sample dropped by Smoke Loader

    • SHA1 hash: 8532e67e1fd8441dc8ef41f5e75ee35b0d12a087

    Whiffy Recon C2 server

    • 194.87.32[.]20

    Whiffy Recon payload URL

    🛡️ Recommendations:
    Cybersecurity professionals are advised to be vigilant against Smoke Loader malware and Whiffy Recon malware. Monitoring for these indicators of compromise can aid in identifying and mitigating potential threats.

    Source: https://cybersecuritynews.com/smoke-loader-malware-locates-using-wi-fi/

    #Cybersecurity #ThreatAnalysis #MalwareDetection #GeolocationTracking #WindowsMalware

    EvilExtractor: Windows-Malware stiehlt mehr als nur Passwörter

    Auf Wunsch verschlüsselt die EvilExtractor-Malware auch Dein Windows-System und überträgt Browser-Daten und lokale Dateien an den Angreifer.

    Tarnkappe.info
    Android Apps haben Malware im Schlepptau - dank "Zombinder"

    Der Darknet-Dienst "Zombinder" erlaubt es, eine Malware an bestehende Android-Apps anzuhängen und Google Play Protect zu überlisten.

    Tarnkappe.info