Fake Installer for a Popular VPN Program installs Trojan

By

This week, the SonicWall Capture Labs Threat Research Team has analyzed a malware sample purporting to be a NordVPN installer but was also distributing a Trojan. Purporting to be a legitimate software while slipping in a malicious program is a behavior many malware authors utilize to trick unsuspecting users in installing malware to gain access to their systems. In this case, a user’s objective in installing the supposedly legitimate program might be to protect and secure their privacy online but instead gets the complete opposite.

Infection cycle:

The installer arrives as a winrar self-extracting archive using a legitimate NordVPN icon.

It drops the following files into the temp directory:

  • %Temp%/Rarsfx0/nordvpnsetup.exe
  • %Temp%/Rarsfx0/nord-sig.exe

It executes nordvpnsetup.exe and installs the legitimate software, NordVPN, along with the appropriate .NET framework version if the system does not have this prerequisite program installed.

It then executes nord-sig.exe which uses the following icon and also pretends to be another legitimate software.

It performs a slew of malicious actions which include the following:

  • It spawns svchost.exe to connect and send encrypted data to remote servers:
    • sync-time.xyz
    • afsasdfa33.xyz
    • bacloud.info
    • mivocloud.com

      

  • It executes a batch file which then executes a powershell script to download additional components.

  • These components are legitimate programs that we can assume will be used for malicious intent. The files are then saved in the following directories:
    • \Windows\Help\tmp<random>.dat – RDP wrapper library that can be used to establish remote terminal connections
    • \Windows\Help\tmp<random>.dat – installs legitimate components in the %APPDATA%\local\<random> folder which utilizes Microsoft Connection Manager Profile Installer (cmstp.exe) which can be used to run arbitrary commands remotely using an INF file
    • \Windows\Help\tmp<random>.dat – also creates another random folder under %APPDATA%\local\ directory and  installs legitimate components utilizing WFS.exe – Windows Fax and Scanner ultility which can be used to send and received documents as email attachments from the computer.

The intention of this Trojan is clear. We urge our users to always be vigilant and cautious when installing software programs particularly if you are not certain of the source.

SonicWall Capture Labs provides protection against this threat via the following signatures:

  • GAV: Kpot.G (Trojan)
  • GAV: Kpot.S (Trojan)
  • GAV: Kpot.D (Trojan)
  • GAV: Kpot.D_2 (Trojan)

This threat is also detected by SonicWALL Capture ATP w/RTDMI and the Capture Client endpoint solutions.

 

 

 

 

 

 

Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.