Malicious MSI Files Exploit DLLs, Scheduled Tasks, Firewall Configuration

Apps & Games / Malicious MSI Files Exploit DLLs, Scheduled Tasks, Firewall Configuration
19 Jun 2024

The malicious MSI files, such as letvpn.msi, use Dynamic Link Libraries (DLLs) during installation. These DLLs facilitate various operations, including property management, task scheduling, and firewall configuration. The MSI file creates scheduled tasks and configures firewall rules to whitelist both inbound and outbound traffic associated with the malware, ensuring uninterrupted operation.

Technical Analysis

During the installation process, the malicious MSI files drop several components into the system. For instance, LetsPro.msi is known to drop files such as:

  1. File Name: 1
    Size: 9996288
    MD5 Hash: D82362C15DDB7206010B8FCEC7F611C5
    Parent Directory: C:\Users\%USERNAME%
  2. File Name: 792258.vbs
    Size: 2405
    MD5 Hash: CD95B5408531DC5342180A1BECE74757
    Parent Directory: C:\Users\%USERNAME%
  3. File Name: LetsPRO.exe
    Size: 40960
    MD5 Hash: FE7AEDAB70A5A58EFB84E6CB988D67A4
    Parent Directory: C:\Users\%USERNAME%

The use of DLLs in these malicious MSI files is particularly concerning as they enable a range of operations that can compromise system security. By creating scheduled tasks and configuring firewall rules, the malware ensures it can operate without interruption, making it harder for traditional security measures to detect and neutralize the threat.

Malicious AI Applications

Void Arachne has also promoted AI technologies that can be used for virtual kidnapping and sextortion schemes. These include voice-altering and face-swapping AI applications advertised on Telegram channels. The group has shared infected modifier applications that create nonconsensual deepfake pornography, often used in sextortion schemes.

A screenshot of the Void Arachne Telegram channel advertising face-swapping applications illustrates the extent to which these malicious tools are being disseminated. The combination of advanced AI technologies with traditional malware tactics represents a new frontier in cyber threats.

Distribution Methods

Void Arachne employs multiple initial access vectors to distribute malware, including SEO poisoning and spear-phishing links. These links are hosted on attacker-controlled websites disguised as legitimate sites, ranking high on search engines. The group also shares malicious MSI files on Chinese-language-themed Telegram channels, increasing the chances of infection.

An attacker-controlled website that hosts a malicious payload exemplifies the sophisticated methods used by Void Arachne to distribute their malware. These sites are designed to appear legitimate, making it difficult for users to discern the threat until it is too late.

Impact and Recommendations

The proliferation of these malicious MSI files poses a significant threat to organizations and individuals. Malware can lead to system compromise, data theft, and financial losses. Trend Micro has curated comprehensive resources to educate the community on identifying, preventing, and addressing sextortion attacks. Victims are strongly advised to report incidents to relevant authorities, such as the Internet Crime Complaint Center (IC3).

The campaign orchestrated by Void Arachne highlights the growing sophistication of cyber threats and underscores the need for robust cybersecurity measures. Individuals and organizations can protect themselves from such threats by staying informed and implementing best practices in cybersecurity.

  • Regularly update software and systems to patch vulnerabilities.
  • Use multi-factor authentication to add an extra layer of security.
  • Avoid clicking on suspicious links or downloading unknown files.
  • Educate employees about the risks of phishing and other social engineering attacks.

The evolving landscape of cyber threats demands vigilance and proactive measures to ensure safety and security in the digital world.

Update: 19 Jun 2024