TROX Stealer:利用心理操纵和高级技术窃取敏感信息的新恶意软件
TROX Stealer是一种新型恶意软件即服务(MaaS),通过伪装成债务催收或法律威胁的钓鱼邮件传播。它利用心理操控和多层混淆技术窃取信用卡信息、浏览器凭证及加密货币钱包等敏感数据,并采用匿名化基础设施进行攻击。研究人员建议加强行为监控和邮件安全措施以应对威胁。 2025-4-13 07:17:17 Author: cybersecuritynews.com(查看原文) 阅读量:2 收藏

TROX Stealer Exfiltrate Sensitive Data Including Stored Credit Cards & Browser Credentials

A newly identified malware strain known as TROX Stealer has emerged as a significant threat to consumer data security, leveraging psychological manipulation and technical sophistication to exfiltrate sensitive information.

First observed in December 2024 by Sublime Security analysts, this Malware-as-a-Service (MaaS) product targets stored credit card details, browser credentials, cryptocurrency wallets, and session files for platforms like Discord and Telegram.

The malware operates on a weekly subscription model, enabling rapid deployment of short-lived campaigns that prioritize volume over persistence.

Google News

TROX Stealer distinguishes itself through its exploitation of urgency-based social engineering.

DEBT COLLECTION COURT DOCUMENTS (Source – Sublime Security)

Attackers deliver payloads via emails disguised as debt collection notices or legal threats, capitalizing on victims’ anxiety to bypass scrutiny.

These messages, often generated using large language models (LLMs), direct recipients to spoofed domains hosting malicious executables.

The payloads employ multi-layered obfuscation techniques, including Python-to-native binary compilation and WebAssembly (Wasm) smuggling, to evade detection.

Sublime Security researchers identified that the malware’s infrastructure reveals a methodical approach to operational security.

Attack domains such as documents[.]debt-collection-experts[.]com use tokenized download links to prevent re-infection and complicate analysis.

The campaign’s backbone relies on IP addresses like 89.185.82.34—a suspected Tor exit node—and Cloudflare-protected servers, illustrating the authors’ investment in anonymization.

Infection Mechanism: From Social Engineering to Silent Execution

The infection chain begins with a carefully crafted email urging immediate action to avoid legal consequences.

A typical subject line, “Final Warning: Legal Action Pending for Your Account,” directs victims to a link labeled “DEBT COLLECTION COURT DOCUMENTS.”

Clicking this link triggers a download of an executable file named DebtCollectionCase#######.exe, where the placeholder represents a unique seven-digit identifier.

The downloaded executable, compiled using Nuitka to convert Python scripts into native binaries, extracts components to a temporary directory (%Temp%\onefile_11536_133873237425638862).

These components include:-

  • A decoy PDF (e.g., client_pdf_case_388.pdf) mimicking legitimate legal documents
  • A Node.JS interpreter (node700.exe) embedding malicious JavaScript
  • Support libraries like libcrypto-3.dll and python312.dll

The Python script orchestrates file execution, as revealed by internal documentation extracted during analysis:-

 
```python  
def install_files(user_profile, target_dir, source_dir, exe_pattern, pdf_pattern):  
    # Copies 'node*.exe' and PDFs to AppData  
    ...  
def run_files(user_profile, target_dir, exe_pattern, pdf_pattern):  
    # Executes the Node.JS binary and opens the decoy PDF  
    ...  
```
Decoy PDF (Source – Sublime Security)

The decoy PDF contains metadata artifacts such as Modified: Copy\040388, a signature of automated generation via PyPDF2.

Meanwhile, the Node.JS binary executes a Base64-encoded WebAssembly module, enabling Rust-compiled payloads to run in memory:-

```javascript  
var bytes = Buffer2.from("AGFzbQEAAAABvwRHYAJ/fwBgAX8AYAJ/fwF/YAN/f38Bf2ADf39/A...");  
var wasmModule = new WebAssembly.Module(bytes);  
var wasmInstance = new WebAssembly.Instance(wasmModule, imports);  
```

This 2MB Wasm blob contains over 4,700 functions, many interacting with system APIs to harvest data.

Upon execution, the malware transmits a JSON profile of the victim’s system to 172.22.117.177:2777, including hardware specs and OS details:-

```json  
{  
  "username": "admin",  
  "osType": "Windows_NT",  
  "cpuModel": "Intel(R) Core(TM) i5-6400",  
  "totalMemoryGB": "3.99"  
}  
```

The IP, registered to “STARK INDUSTRIES SOLUTIONS LTD.” in London, resolves to a server hosting additional payloads (*.json and *.js files), suggesting dynamic C2 capabilities.

TROX Stealer’s use of urgency-themed lures and rapidly shifting infrastructure complicates traditional IOC-based detection.

Defenders should prioritize behavioral monitoring for processes like node*.exe spawning from temporary directories and outbound connections to high-risk IPs.

The malware’s reliance on Wasm and LLM-generated decoys underscores the need for advanced email security solutions capable of intercepting socially engineered threats before they reach end-users.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Also Read:


文章来源: https://cybersecuritynews.com/trox-stealer-exfiltrate-sensitive-data/
如有侵权请联系:admin#unsafe.sh