A Newly Discovered CRON#TRAP Malware Infects Windows Machines by Concealing Itself in a Linux Virtual Machine to Bypass Antivirus Detection

Nov 08, 2024Ravie LakshmananMalware / Virtualization

Cybersecurity experts have identified a fresh malware tactic targeting Windows machines, where it leverages a Linux virtual environment to implant a hidden backdoor enabling remote control over

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Nov 08, 2024Ravie LakshmananMalware / Virtualization

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Cybersecurity experts have identified a fresh malware tactic targeting Windows machines, where it leverages a Linux virtual environment to implant a hidden backdoor enabling remote control over the compromised systems.

The campaign, known as CRON#TRAP, kicks off with a malicious Windows LNK file distributed via a phishing email, likely concealed in a ZIP archive.

“What sets the CRON#TRAP operation apart is the presence of a pre-configured backdoor in the emulated Linux environment, establishing automatic connections with a command-and-control (C2) server under the attacker’s control,” shared analysis by Securonix researchers Den Iuzvyk and Tim Peck revealed.

Cybersecurity

“By setting up the Linux environment with the backdoor, attackers can surreptitiously maintain control over the victim’s system, hiding further malicious actions within an obscured setup, posing a challenge for conventional antivirus solutions to detect,” the researchers added.

The phishing emails masquerade as an “OneAmerica survey” and come with a large 285MB ZIP archive that, upon opening, initiates the infection process.

As part of the unattributed attack strategy, the LNK file acts as a medium to extract and trigger a customized Linux environment simulated using Quick Emulator (QEMU), an authentic open-source virtualization utility. The virtual machine runs on Tiny Core Linux.

Malware Linux VM

Subsequently, the shortcut triggers PowerShell commands to extract the content of the ZIP file and run a hidden “start.bat” script, presenting a fake error message to the victim to mislead them into believing that the survey link is no longer accessible.

Meanwhile, the QEMU-based virtual Linux environment dubbed PivotBox is set up in the background, pre-equipped with the Chisel tunneling utility, granting immediate remote access to the host as soon as the QEMU instance is operational.

“The binary seems to be a pre-configured Chisel client tailor-made to connect to a remote Command-and-Control (C2) server at 18.208.230[.]174 using websockets,” stated the researchers. “This method effectively transforms the Chisel client into a complete backdoor, enabling undetectable remote control traffic to flow in and out of the Linux environment.”

Malware Linux VM

This development represents one of various constantly evolving techniques deployed by threat actors to undermine organizations and mask malicious behavior. For example, a spear-phishing campaign has been observed targeting electronic manufacturing, engineering, and industrial firms in European nations to distribute the elusive GuLoader malware.

“The emails claim to be ‘OneAmerica survey’ with a large ZIP attachment, aiming to trick the victim into executing the attack,” mentioned Cado Security researcher Tara Gould noted. “The emails often seem to originate from forged companies or compromised accounts, crafting a sense of legitimacy and enticement for the victim to engage.”

Cybersecurity

This operation, primarily aimed at countries like Romania, Poland, Germany, and Kazakhstan, begins with a batch file inside the archived file. The batch file conceals an encoded PowerShell script which subsequently fetches another PowerShell script from a remote server.

The secondary PowerShell script features capabilities to reserve memory and eventually execute GuLoader shellcode to grab the succeeding-stage payload.

“The evolving tactics employed by the Guloader malware to dodge detection and deliver RATs remain a significant concern. Threat actors are persistently focusing on particular sectors in specific regions, underscoring the importance of adopting proactive security measures,” Gould concluded.

Found this article intriguing? Follow us on Twitter and LinkedIn to access more exclusive content we publish.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.