SPEAK WITH AN EXPERT

Infostealers from Digitally Signed Droppers Targeting Windows Users 

Updated February 3, 2025

Executive Summary 

On January 24, 2025, CyberProof researchers spotted a likely new campaign of digitally signed malicious droppers used by attackers to spread infostealers against global organizations. The droppers were likely spread through social engineering tricks impersonating Zoom, Teams, Bravo, Wechat, and other virtual meeting & calling applications. Similar observations were reported by a security researcher in a tweet a few days later on the 27th of January. The final payloads observed during our investigation were NetSupport RAT, LummarStealer, CobaltStrike, and Remcos RAT. 

CyberProof researchers assess with high confidence that this new campaign is likely only intended to target users to steal their credentials and may be used for a futuristic attack. At the time of writing this report, only windows users were targeted by this new campaign. 

We will continue to monitor this campaign and will provide updates on any additional activities or changes in tactics, techniques, and procedures (TTPs) used by these cyber criminals. Current CyberProof customers are protected from this campaign.

Technical Details

Our team’s research, over the course of a year, has revealed that top infostealers are changing their tactics to bypass detection technologies and stay under the radar of security analysts. Below we will share our observations on the top infostealers and TTPs connected to this campaign.  

The top infostealers observed were LummaStealer, Danabot, StealC, Amadey, Remcos, NetSupport RAT, Raccoon, etc. In 2023 and early 2024, these infostealers were predominantly spreading through IDAT loader (aka HijackLoader) campaigns that challenged researchers with many anti-analysis tricks including steganography to make analysis difficult.

Fig: IDAT marker string check before decrypting the next level shellcode

The name IDAT loader is derived from the fact that the loader checks for IDAT string in the shellcode before decrypting the next stage payload. 

In recent months these infostealer attacks surged through FakeCaptcha campaigns with instructions.

A web page CAPTCHA prompts Windows users to check a box confirming they are human, titled

Clicking the “I’m not a robot” button in the FakeCaptcha, copies a PowerShell script to the clipboard and displays so-called “verification steps” that include: 

  • Press Win + R (this opens the Run dialog box); 
  • Press CTRL + V (this pastes the line from the clipboard into the text field); 
  • Press Enter (this executes the code). 

The most recent infostealer campaign identified on the 24th of January looks to spread through possible malvertising pages serving digitally signed droppers impersonating as fake meeting applications. Some of the applications impersonated for deception include: 

Icons in a row: Keyhole symbol, Microsoft Loop, Zoom, DVD with case, Software box with CD, Microsoft Teams. Ideal for Windows users who rely on these tools for seamless collaboration and communication.

Further investigation revealed attackers using these droppers to spread infostealers namely NetSupport RAT, LummaStealer, CobaltStrike, and Remcos RAT. Clearly indicating the motivation of the campaign is to target victims for user credentials. Some of these droppers are digital signers. Those observed to have been abused in this campaign include:

  • DRSSOFT INC
  • PREMERA LLC
  • ANALYZER ENTERPRISES LLP

Here’s an example of a sample signed by DRSSOFT INC:

Verification details of a signed file from InstallShield, showing file version, signers, and X509 certificate information. Particularly important for Windows users concerned about infostealers and ensuring their software isn't compromised by digitally signed droppers.

Indicators of Compromise 

MD5 of Droppers observed include: 

  • 4c6d58378be4b9051debfb5670f5b82c 
  • 3019c6c4f427e2407a1674e09ed4e545 
  • 258b7dd229fe3678dd729b5625df0846 
  • 440df12d81e75b5c98a36e4760a7e6ca 
  • 3b611cb90a2a15ed16b10e8597fb6578 
  • f4a4f19999a4f101d6df09b08366938b 
  • 6624cc2996ef930654b9ef3ef8171163 
  • Fa9267820f3ec58aeda90772a3c9fc44 
  • 0f145a85cfe6900ed7ab6444a32d03ec 
  • f2b346296bd558530a96cffc5c4bd18f 
  • a8269459960c65419748c0b4a18516a5 

Recommendations

We recommend the following to safeguard against these threats:

  • Invest in Employee Training: Employees are often the first line of defense against cyber threats. Training staff to recognize phishing emails, suspicious links, and other common attack vectors is critical. Regularly updated cybersecurity training programs ensure employees stay aware of evolving threats and adhere to best practices. 
  • Leverage Advanced Platforms: Modern threat detection platforms equipped with real-time monitoring, AI-driven threat intelligence, and automated response mechanisms are indispensable. These tools enable organizations to detect and neutralize threats swiftly, minimizing potential damage. 
  • Perform Regular Audits: Routine evaluations of your cybersecurity framework help identify and address vulnerabilities. Audits also ensure compliance with regulatory standards and improve the overall robustness of your security posture.
     

How CyberProof Can Help

As cyber threats continue to evolve, so too must the strategies and technologies used to combat them. Threat detection is a critical component of any organization’s cybersecurity strategy. Learn how CyberProof can help your organization effectively detect and respond to cyber threats.