Malicious Code Hidden in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

January 16, 2025

Cyber criminals have been identified using a novel approach to deliver malware, hiding malicious code within images. This technique has been utilized in separate campaigns to deploy malware such as VIP Keylogger and 0bj3ctivity Stealer.

HP Wolf Security, in their Threat Insights Report for Q3 2024, noted that both campaigns involved attackers concealing malicious code in images uploaded to archive[.]org, a file-hosting website. The same .NET loader was used to install their final payloads.

The initial point of these attacks is a phishing email, disguised as invoices and purchase orders, designed to trick recipients into opening malicious attachments. These attachments, often Microsoft Excel documents, exploit a known security flaw, CVE-2017-11882, in Equation Editor to download a VBScript file.

This script is programmed to decode and execute a PowerShell script that retrieves an image hosted on archive[.]org and extracts a Base64-encoded code. This code is then decoded into a .NET executable and executed. The .NET executable acts as a loader to download VIP Keylogger from a specified URL and runs it, enabling the cyber criminals to steal a broad range of data from the compromised systems, including keystrokes, clipboard content, screenshots, and credentials. VIP Keylogger has functional similarities with Snake Keylogger and 404 Keylogger.

A similar campaign has been discovered to send malicious archive files to targets via email. These emails, masquerading as requests for quotations, are designed to entice recipients into opening a JavaScript file within the archive that then initiates a PowerShell script.

In a manner akin to the previous case, the PowerShell script downloads an image from a remote server, interprets the Base64-encoded code within it, and runs the same .NET-based loader. However, the attack chain in this case ends with the deployment of an information stealer named 0bj3ctivity.

The similarities between the two campaigns suggest that cyber criminals are using malware kits to enhance overall efficiency, while also reducing the time and technical expertise required to orchestrate the attacks. HP Wolf Security also noticed bad actors employing HTML smuggling techniques to deliver the XWorm remote access trojan (RAT) via an AutoIt dropper, mirroring previous campaigns that distributed AsyncRAT in a similar manner.

Threat actors have been observed creating GitHub repositories advertising video game cheat and modification tools to deploy the Lumma Stealer malware using a .NET dropper. Alex Holland, principal threat researcher in the HP Security Lab, noted that these campaigns demonstrate the increasing commodification of cybercrime, with malware kits becoming more accessible, affordable, and user-friendly, enabling even novices with limited skills and knowledge to assemble an effective infection chain.

Related News

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.