![Fake Google Chrome Sites Fake Google Chrome Sites](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuzlqIo6p9f57LS1VIRtlFZa5qROB8u2Q_UCQHuq0kl-rPmDzWTaw5f4kp5p5Qg3wGdsSED_TYgVCCTinQZleZUIvdwGUi3J0wYqKLpWUdue_KYAEzB2LkJvJhkkksfievK8k6etkp9dJy7XTGy8erDFBaOVj6fBzlMk-fNizsR1AjE-dDmJR-ZY1KDv8c/s728-rw-e365/chrome-malware.png)
The Bogus website advertises Google Chrome is used to distribute malicious installers for remote access trojans called Valleyrat.
The malware first detected in 2023 is attributed to threat actors tracked as Silver Fox and is primarily targeted at Chinese-speaking regions such as Hong Kong, Taiwan and mainland China.
“The actor is increasingly targeting key roles within the organization, particularly in the finance, accounting and sales sectors. He has a strategic focus on high value locations with access to sensitive data and systems. We are emphasizing that.” Week.
![Cybersecurity](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg)
Early attack chains have been observed to provide valley rats along with other malware families such as purple foxes and GH0st rats, the latter being widely used in various Chinese hacking groups.
Like last month, the legitimate software counterfeit installer served as a distribution mechanism for Trojans using a DLL loader named PngPlug.
It is worth noting that a drive-by download scheme targeting Chinese-speaking Windows users was previously used to deploy GH0st rats using the malicious installer package of the Chrome web browser.
![Fake Google Chrome Sites Fake Google Chrome Sites](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj06kelZnpiQ4AUhe0VKOb-kFGUbP9l5nIDUEU-zxnay91c_Npz7QhFzvxjW5dcqx-LeaZJBZsbcldyBnwRCGEgtbWeY8qcSTM-kozcoTDbYyzngCtHTuUJNAQy0i9YLE0BdMkKN8opw7m8-Ih7_IOEWGFxcO1GOX3Kh4yvB5o0Z1bC1BCup_hQ7JFKFgxX/s728-rw-e365/hacking.png)
In a similar way, the latest attack sequence related to ValleyRat involves using fake Google Chrome websites to trick the target into downloading a ZIP archive containing the executable file (“setup.exe”) ).
The binary checks if there is administrator privileges at runtime and downloads four additional payloads containing legal executables related to Douyin (“Douyin.exe”), the Chinese version of Tiktok. Masu. “tier0.dll”), launch ValleyRat malware.
It also retrieves another dll file (“sscronet.dll”). This is responsible for terminating any running processes that exist in the exclusion list.
![Cybersecurity](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png)
Edited in Chinese and written in C++, Valleyrat is a Trojan horse designed to monitor screen content, log keystrokes and establish host persistence. You can also start communicating with a remote server, enumerating the processes and waiting for further instructions to allow you to download and run any DLLs, binaries, etc.
“Because of payload injection, the attacker abused a legitimately signed executable that was vulnerable to DLL search order hijacking,” Uzan said.
The development was due to the fact that Sophos avoided detection using Scalable Vector Graphics (SVG) attachments and shared details of a phishing attack that provides car-based keystroke loger malware such as Nymeria and Direct users to the qualification harvest page. is.
Source link