The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malware developments that demand immediate attention. We complement this effort with our internal tracking and monitor events the security community reports to stay up-to-date with the latest changes in the cyber threat landscape.
In May 2025, the VMRay Labs team has been focused on the following areas:
1) New VMRay Threat Identifiers addressing:
2) New or updated configuration extractors for:
3) Again, this month, almost 20 new YARA rules!
Now, let’s delve into each topic for a more comprehensive understanding.
In a few last blog posts, we introduced you to the concept of the VMRay Threat Identifiers (VTIs). In short, VTIs identify threatening or unusual behavior of the analyzed sample and rate the maliciousness on a scale of 1 to 5, with 5 being the most malicious. The VTI score, which greatly contributes to the ultimate Verdict of the sample, is presented to you in the VMRay Platform after a completed analysis. Here’s a recap of the new VTIs that we added, or improved in the past month.
Category: Defense Evasion
MITRE ATT&CK® Technique: T1562.004
Our Labs team recently analyzed a malware sample exhibiting suspicious manipulation — specifically, adding and removing firewall rules. In response, we created a new VTI designed to trigger when such behaviors are observed, as they are strong indicators of unwanted or unintentional tampering with the system’s configuration.
In legitimate cybersecurity operations, modifying firewall rules is a routine task, used by administrators to isolate systems, implement access controls, enforce security policies, or respond to incidents. However, when malware performs this action, its intent is rarely benign.
Malware may remove existing blocking rules in order to:
Sneak past security protections, like firewalls that block suspicious internet connections.
Open up the system to allow other attackers in or let the malware spread to other devices on the same network.
While it may seem counterintuitive, malware also often adds firewall rules to:
Silence security tools by blocking them from sending alerts to IT teams or antivirus systems.
Allow only its own activity through the firewall, keeping everything else out.
Create a “safe zone” where only specific traffic is allowed, making it harder for defenders to spot anything unusual.
Seen in the wild: Well-known malware families such as Emotet and TrickBot have demonstrated this tactic — disabling Windows firewall entirely or creating custom rules to allow their own processes to operate undisturbed.
Category: System Modification
MITRE ATT&CK® Technique: T1562.001
Safe Mode is a special Windows startup option that loads only the core components needed for the system to run. It’s widely used for troubleshooting issues such as malware infections, faulty drivers, or system instability. What makes Safe Mode work is a behind-the-scenes system configuration known as SafeBoot. This is a critical registry structure that defines which drivers and services Windows should load when entering Safe Mode. You can think of it like this:
Malware may attempt to delete the SafeBoot key for the following reasons:
1) Preventing recovery and delaying remediation: by deleting the SafeBoot registry key, attackers effectively disable Safe Mode, making it harder for responders to boot into a clean environment to investigate or remove threats. As a result, remediation must occur while the malware remains fully active, significantly increasing the risk of persistence or re-infection during the cleanup process.
2) Disrupting automated tools: some EDR/AV tools perform special scans or repairs in Safe Mode. Disabling SafeBoot blocks these automated recovery routines and allows malware to remain undetected longer.
In the past month, we introduced a new VTI that detects attempts to delete or disable SafeBoot on Windows systems to better defend against this technique.
Category: Persistence
MITRE ATT&CK® Technique: T1543.002
Persistence is key to a successful malware campaign, and attackers increasingly leverage native system tools to stay hidden. One such tactic involves creating a systemd
service file — a legitimate way to manage background processes on modern Linux systems, but also one that can be misused by threat actors. A systemd
service file tells the system how to start, stop, and manage a process, which makes it an ideal tool for malware looking to auto-start on boot, restart on failure, or run with specific privileges.
During a recent investigation, our Labs team observed the Prometei malware employing:
Dropping a systemd
service file, and
Enabling it via systemctl
This behavior in malware context should raise suspicion, as:
1) By creating a .service
file in a systemd
-controlled directory, the malware ensures it is automatically executed at system startup — a classic persistence mechanism.
2) When dropped into system-wide paths like /usr/lib/systemd/system/
or /etc/systemd/system/
, the service is launched by systemd
as root. This grants the malware full access to system files, processes, network settings, and even security tools — which it may disable.
3) The service file can include directives like Restart=always, meaning systemd
will automatically restart the malware process if it is terminated, making remediation more difficult.
To counter this threat, we introduced a new VTI that detects when a new systemd
service file is created by the analyzed sample.
Last month, we introduced a new YARA signature for the VideoSpy malware family (also known as Wetfossil). This emerging threat continues to gain traction in the wild, yet public knowledge about its behavior and capabilities remains limited.
As we highlighted previously, references to the name VIDEOSPY offer a strong hint about the malware’s functionality. Our ongoing analysis confirms that this malware is designed to perform invasive surveillance actions on compromised systems, including:
Silently activating the victim’s webcam
Capturing video feeds or snapshots
Exfiltrating this footage to a remote command-and-control (C2) server
To enhance visibility into VideoSpy’s and strengthen our detection capabilities, we developed and integrated a new malware configuration extractor into the VMRay Platform.
Lumma Stealer, this infostealer malware first spotted in 2022, has rapidly evolved into one of the most active threats in the cybercrime ecosystem. Written in C and sold as Malware-as-a-Service on Russian-speaking forums, Lumma continues to target sensitive user data — particularly cryptocurrency wallets and 2FA credentials. Despite recent takedown efforts, most notably Operation Endgame in May 2025, which aimed to dismantle major initial access malware operations including Lumma — the stealer continues to operate in the wild.
Over the past year, our Lumma config extractor, originally built to support version 4.0, has been a reliable tool for parsing and analyzing Lumma samples. But recent campaigns have shown signs of new variants.
We observed Lumma spreading through new and deceptive channels:
GitHub abuse: Threat actors are impersonating GitHub Security Team members in comments on that platform, urging developers to download supposed “fixes”, which are in fact Lumma payloads.
: Users are redirected to malicious web pages displaying phony CAPTCHA challenges. Interacting with these prompts PowerShell scripts that fetch and execute Lumma malware.
New version activity: Community posts on X and underground forums suggest that new Lumma variants are circulating in the wild, likely with updated configuration formats and evasion techniques.
In response, our configuration extractor logic was updated ensuring compatibility with recent builds of Lumma. Additionally, we refined our YARA rules to improve detection across new variants.
The previous month’s detection updates brought a powerful boost to our Platform with over 20 new YARA rules! In this blog, we’ll give you a quick overview of the latest additions (again, almost 20 new or updated rules).
Its notable capabilities include:
Windows Registry manipulation
Use of MPRESS compression to obfuscate code and evade detection
GremlinStealer is a fresh piece of malware that surfaced on Telegram in March 2025. Early analysis suggests it shares several components with the SharpStealer malware family, suggesting that it could be a modified variant or fork of that codebase.
First seen in early 2023, StealC is an infostealer introduced by a developer operating under the alias “Plymouth” on Russian-language cybercrime forums.
The FORSSHE/Bespin backdoor is one of many malicious OpenSSH-based threats that specifically target Linux systems. It was thoroughly analyzed in ESET’s report “The Dark Side of the ForSSHe,” which uncovered 21 different backdoor variants — many of them previously unknown.
This particular malware is designed to steal credentials, provide covert remote access, and maintain persistence on infected machines by modifying legitimate SSH binaries.
DonutLoader is known for:
Injecting code into legitimate processes, allowing stealthy execution under trusted binaries
Encrypting payloads, making reverse engineering and static analysis more difficult
We added new YARA rule to detect AteraAgent, a legitimate Remote Monitoring and Management (RMM) tool increasingly abused by threat actors.
While AteraAgent is commonly used by IT professionals and MSPs to remotely manage endpoints, deploy software, monitor system health. However, adversaries are leveraging it for:
Persistence in compromised environments
Data exfiltration and remote command execution
Due to its legitimate nature, AteraAgent often bypasses traditional defenses like firewalls and antivirus tools.
We enhanced our existing YARA rule for XORDDoS, reflecting recent changes observed in this malware family’s code.
XORDDoS is a longstanding Linux Trojan that turns infected machines — including servers, IoT devices, and Docker containers — into bots for large-scale DDoS attacks.
The malware is named after its use of XOR encryption to obfuscate configuration data and communication with its command-and-control (C2) servers.
Known for spear phishing and credential harvesting targeting:
Western governments, think tanks, defense contractors, academics, and NGOs.
Individuals involved in Ukraine and NATO policy.
Its primary goal is Espionage, not financial gain — focused on stealing sensitive data.
In a recent article by Wesley Shields, a researcher at Google Threat Intelligence Group, she discusses new malware attributed to COLDRIVER: “Google Threat Intelligence Group (GTIG) has identified a new piece of malware called LOSTKEYS, attributed to the Russian government-backed threat group COLDRIVER. LOSTKEYS is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker.”
At the start of last year, we introduced enhanced support for detecting Windows script-based threats triggered by .LNK files (Windows shortcuts) in the VMRay Platform.
Recently, we came across a clever use of an .LNK file that goes far beyond what you’d expect from a simple shortcut. In this case, the .LNK file was equipped to do more than just open a program. It was hiding a full attack chain inside its command line instructions, including the use of PowerShell or HTA (HTML Application) scripts, to download and run further malicious code.
May 2025 was a busy month for our Labs team, marked by major enhancements to our VMRay Threat Identifiers, configuration extractors and a broadened, fine-tuned YARA rule set spanning multiple threat categories.
As attackers refine their tactics, our ongoing commitment remains clear — to stay ahead of the curve, proactively enhancing detection, and equipping defenders with the tools needed to counter modern cyber threats. Stay tuned for our next edition of signature and detection updates, planned to be published in the weeks ahead.