
The subtle malware referred to as ViperSoftX has been seen being allotted as eBooks over torrents.
“A notable side of the present variant of ViperSoftX is that it makes use of the Commonplace Language Runtime (CLR) to dynamically load and run PowerShell instructions, thereby making a PowerShell surroundings inside AutoIt for operations,” Trellix safety researchers Mathanraj Thangaraju and Sijo Jacob stated.
“Through the use of CLR, ViperSoftX can seamlessly combine PowerShell capability, permitting it to execute malicious purposes whilst evading detection mechanisms that would possibly differently flag standalone PowerShell job.”

To begin with detected by way of Fortinet in 2020, ViperSoftX is understood for its skill to exfiltrate delicate knowledge from compromised Home windows hosts. Through the years, the malware has turn out to be a related instance of danger actors ceaselessly innovating their techniques in an try to keep stealthy and circumvent defenses.
That is exemplified by way of the greater complexity and the adoption of complex anti-analysis ways equivalent to byte remapping and internet browser communique blocking off, as documented by way of Development Micro in April 2023.
As just lately as Might 2024, malicious campaigns have leveraged ViperSoftX as a supply car to distribute Quasar RAT and some other knowledge stealer named TesseractStealer.
Assault chains propagating the malware are recognized to make use of cracked tool and torrent websites, however using eBook lures is a newly seen method. Provide throughout the meant eBook RAR archive report is a hidden folder in addition to a misleading Home windows shortcut report that purports to be a benign file.
Executing the shortcut report initiates a multi-stage an infection collection that starts with the extraction of PowerShell code that unhides the hid folder and units up endurance at the gadget to release an AutoIt script that, in flip, interacts with the .NET CLR framework, to decrypt and run a secondary PowerShell script, which is ViperSoftX.
“AutoIt does now not by way of default strengthen the .NET Commonplace Language Runtime (CLR),” the researchers stated. “Alternatively, the language’s user-defined purposes (UDF) be offering a gateway to the CLR library, granting malevolent actors get right of entry to to PowerShell’s bold features.”

ViperSoftX harvests gadget knowledge, scans for cryptocurrency wallets by way of browser extensions, captures clipboard contents, and dynamically downloads and runs further payloads and instructions according to responses gained from a far flung server. It additionally comes with self-deletion mechanisms to problem detection.
“Probably the most hallmark options of ViperSoftX is its adept use of the Commonplace Language Runtime (CLR) to orchestrate PowerShell operations throughout the AutoIt surroundings,” the researchers stated. “This integration permits seamless execution of malicious purposes whilst evading detection mechanisms that might normally flag standalone PowerShell job.”
“Moreover, ViperSoftX’s skill to patch the Antimalware Scan Interface (AMSI) prior to executing PowerShell scripts underscores its resolution to avoid conventional security features.”