The AhnLab Safety Intelligence Heart (ASEC) has not too long ago issued an in depth report confirming the persistent distribution of ViperSoftX malware by risk actors, with notable affect on customers in South Korea and past.
First recognized by Fortinet in 2020, ViperSoftX is a complicated PowerShell-based malware designed to infiltrate contaminated programs, execute distant instructions, and steal delicate knowledge, significantly focusing on cryptocurrency-related info.
Ongoing Menace Targets Cryptocurrency Customers Globally
Disguised as cracked software program, key mills, and even eBooks on torrent websites, as reported by Avast (2022), Development Micro (2023), and Trellix (2024), this malware employs misleading preliminary entry ways to ensnare unsuspecting victims worldwide.
Using such unlawful duplication applications as an an infection vector stays a prevalent technique amongst numerous cybercriminals, amplifying the attain of ViperSoftX and leading to widespread infections.
ViperSoftX demonstrates exceptional persistence by way of the abuse of Home windows Job Scheduler to execute malicious PowerShell scripts periodically.

These scripts, usually obfuscated or Base64-encrypted, are hid inside recordsdata disguised as logs or saved in registry keys like “HKLMSOFTWAREHPgs6ZtP670 / xr417LXh,” appearing as downloaders for extra payloads.
These downloaders fetch additional malware from command-and-control (C&C) servers utilizing strategies like DNS TXT document queries to dynamically crafted domains.
As soon as deployed, ViperSoftX communicates with its C&C server by way of HTTP headers akin to “X-Consumer-Agent” and “X-notify,” transmitting detailed system info together with laptop identify, Home windows model, and put in antivirus knowledge.
Payload Supply Mechanisms
Past knowledge exfiltration, it displays clipboard exercise to steal BIP39 restoration phrases and cryptocurrency pockets addresses for cash like BTC, ETH, and SOL, whereas additionally using a clipboard safety mechanism to thwart competing ClipBanker malware by terminating suspicious processes.
Moreover, ViperSoftX targets browser extensions and put in applications on platforms like Chrome, Firefox, and Edge, relaying this info to risk actors for additional exploitation.
Its capabilities lengthen to executing instructions, downloading executables, and even self-removal to evade detection.
The malware’s arsenal contains secondary payloads like Quasar RAT, an open-source distant entry Trojan developed in .NET, alongside business instruments akin to PureCrypter, a packer for extra payload supply, and PureHVNC, a distant management malware.

These instruments allow complete management over contaminated programs, keylogging, and credential theft.
Furthermore, ViperSoftX usually deploys ClipBanker, which hijacks cryptocurrency pockets addresses from the clipboard, changing them with attacker-controlled ones throughout transactions a tactic exploiting the complexity and randomness of pockets addresses that customers sometimes copy and paste.
ASEC warns that an an infection can result in complete system compromise, permitting attackers to extract not solely cryptocurrency knowledge but additionally a wide selection of consumer info.
To mitigate dangers, customers are urged to keep away from downloading software program from unverified or suspicious sources, apply the newest safety patches, and preserve up-to-date antivirus options like V3 merchandise to dam identified assault vectors.
Indicators of Compromise (IOCs)
Sort | Worth |
---|---|
MD5 | 064b1e45016e8a49eba01878e41ecc37 |
0ed2d0579b60d9e923b439d8e74b53e1 | |
0efe1a5d5f4066b7e9755ad89ee9470c | |
197ff9252dd5273e3e77ee07b37fd4dd | |
1ec4b69f3194bd647639e6b0fa5c7bb5 | |
URL | http://136.243.132.112/ut.exe |
http://136.243.132.112:881/3.exe | |
http://136.243.132.112:881/APPDATA.exe | |
http://136.243.132.112:881/a.ps1 | |
http://136.243.132.112:881/firefoxtemp.exe | |
IP | 136.243.132.112 |
160.191.77.89 | |
185.245.183.74 | |
212.56.35.232 | |
89.117.79.31 |
To Improve Your Cybersecurity Expertise, Take Diamond Membership With 150+ Sensible Cybersecurity Programs On-line – Enroll Right here