Neue CRON#TRAP-Malware infiziert Windows, indem sie sich in einer Linux-VM versteckt, um Antivirenprogramme zu umgehen

Teilen:

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts.

The “intriguing” campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email.

“What makes the CRON#TRAP campaign particularly concerning is that the emulated Linux instance comes pre-configured with a backdoor that automatically connects to an attacker-controlled command-and-control (C2) server,” Securonix researchers Den Iuzvyk and Tim Peck said in an analysis

“This setup allows the attacker to maintain a stealthy presence on the victim’s machine, staging further malicious activity within a concealed environment, making detection challenging for traditional antivirus solutions.”

The phishing messages purport to be an “OneAmerica survey” that comes with a large 285MB ZIP archive that, when opened, triggers the infection process.

As part of the as-yet-unattributed attack campaign, the LNK file serves as a conduit to extract and initiate a lightweight, custom Linux environment emulated through Quick Emulator (QEMU), a legitimate, open-source virtualization tool. The virtual machine runs on Tiny Core Linux.

Malware Linux VM

The shortcut subsequently launches PowerShell commands responsible for re-extracting the ZIP file and executing a hidden “start.bat” script, which, in turn, displays a fake error message to the victim to give them the impression that the survey link is no longer working.

But in the background, it sets up the QEMU virtual Linux environment referred to as PivotBox, which comes preloaded with the Chisel tunneling utility, granting remote access to the host immediately following the startup of the QEMU instance.

“The binary appears to be a pre-configured Chisel client designed to connect to a remote Command and Control (C2) server at 18.208.230[.]174 via websockets,” the researchers said. “The attackers’ approach effectively transforms this Chisel client into a full backdoor, enabling remote command and control traffic to flow in and out of the Linux environment.”

The development is one of the many constantly evolving tactics that threat actors are using to target organizations and conceal malicious activity — case in point is a spear-phishing campaign that has been observed targeting electronic manufacturing, engineering, and industrial companies in European countries to deliver the evasive GuLoader malware.

“The emails typically include order inquiries and contain an archive file attachment,” Cado Security researcher Tara Gould said. “The emails are sent from various email addresses including from fake companies and compromised accounts. The emails typically hijack an existing email thread or request information about an order.”

The activity, which has mainly targeted countries like Romania, Poland, Germany, and Kazakhstan, starts with a batch file present within the archive file. The batch file embeds an obfuscated PowerShell script that subsequently downloads another PowerShell script from a remote server.

The secondary PowerShell script includes functionality to allocate memory and ultimately execute the GuLoader shellcode to ultimately fetch the next-stage payload.

“Guloader malware continues to adapt its techniques to evade detection to deliver RATs,” Gould said. “Threat actors are continually targeting specific industries in certain countries. Its resilience highlights the need for proactive security measures.

Ravie Lakshmanan

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
1:38 pm, Mai 11, 2025
Wetter-Symbol 23°C
L: 22° | H: 25°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 35 %
Druck: 1009 mb
Wind: 10 mph SSE
Windböe: 24 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 40%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:14 am
Sonnenuntergang: 8:39 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
22° | 25°°C 0.2 mm 20% 12 mph 73 % 1010 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
12° | 19°°C 1 mm 100% 8 mph 90 % 1014 mb 0 mm/h
Di. Mai 13 10:00 pm
Wetter-Symbol
13° | 22°°C 0.78 mm 78% 12 mph 92 % 1020 mb 0 mm/h
Mi. Mai 14 10:00 pm
Wetter-Symbol
10° | 21°°C 0 mm 0% 10 mph 77 % 1023 mb 0 mm/h
Do. Mai 15 10:00 pm
Wetter-Symbol
10° | 21°°C 0 mm 0% 9 mph 69 % 1026 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 12 mph 37 % 1009 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
21° | 21°°C 0 mm 0% 8 mph 44 % 1008 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
16° | 16°°C 0.2 mm 20% 4 mph 73 % 1010 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
14° | 14°°C 0 mm 0% 4 mph 80 % 1010 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
12° | 12°°C 0.36 mm 36% 3 mph 87 % 1010 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
13° | 13°°C 0.23 mm 23% 3 mph 90 % 1011 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
16° | 16°°C 0.24 mm 24% 5 mph 76 % 1012 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
19° | 19°°C 0.87 mm 87% 7 mph 65 % 1012 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€93,067.93
0.94%
Ethereum(ETH)
€2,240.58
4.46%
Fesseln(USDT)
€0.89
0.00%
XRP(XRP)
€2.12
-0.87%
Solana(SOL)
€154.78
2.06%
USDC(USDC)
€0.89
0.00%
Dogecoin(DOGE)
€0.207483
3.65%
Shiba Inu(SHIB)
€0.000014
1.89%
Pepe(PEPE)
€0.000012
2.91%
Peanut das Eichhörnchen(PNUT)
€0.401533
38.44%
Nach oben scrollen