New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

November 8, 2024 at 02:27AM

Researchers have identified a new malware campaign, CRON#TRAP, that infects Windows systems via a malicious shortcut file. It sets up a Linux virtual instance with a backdoor for remote access, complicating detection. Another campaign targets electronics companies using GuLoader malware via spear-phishing emails. Proactive security measures are essential.

### Meeting Takeaways: Nov 08, 2024 – Malware / Virtualization Updates

1. **New Malware Campaign: CRON#TRAP**
– **Nature of Attack**: A malware campaign infects Windows systems with a Linux virtual instance containing a backdoor for remote access.
– **Distribution Method**: Initiated via a phishing email with a malicious Windows shortcut (LNK) file, often packaged in a 285MB ZIP archive disguised as an “OneAmerica survey”.
– **Key Features**:
– The Linux environment operates using Quick Emulator (QEMU) and runs Tiny Core Linux.
– It includes a pre-configured backdoor that connects to an attacker-controlled command-and-control (C2) server.

2. **Execution Process**:
– The LNK file triggers PowerShell commands to extract and run a “start.bat” script, misleading the victim with a fake error message while establishing the Linux environment.
– The embedded Chisel client enables remote command and control traffic.

3. **Related Threats**:
– **Spear-Phishing Campaign**: Targeting electronic manufacturing, engineering, and industrial sectors in European countries (Romania, Poland, Germany, Kazakhstan).
– Utilizes emails with order inquiries and malicious archive attachments containing batch files that execute obfuscated PowerShell scripts to deliver GuLoader malware.

4. **Implications**:
– These evolving tactics underscore the sophistication of current cyber threats, necessitating robust and proactive security measures to mitigate risks.

5. **Next Steps**:
– Emphasize education on recognizing phishing attempts.
– Enhance monitoring for behavior indicative of such malware infections.
– Consider reviewing and updating security protocols against emerging threats.

For continuous updates on cybersecurity topics, consider following us on Twitter and LinkedIn.

Full Article