CRIL has identified a malware campaign aimed at cryptocurrency users. In this campaign, Threat Actors (TA) employed deceptive websites masquerading as legitimate cryptocurrency applications. Notably, we encountered several phishing sites targeting users of Metamask, Wazirx, Lunoapp, and Cryptonotify. All these phishing sites are distributing the same clipper payload, which we have named “XPhase Clipper”.
Clipper malware is a type of malicious software designed to intercept and modify data exchanged between the user and a legitimate application or service, in this case, cryptocurrency wallets or exchanges. The primary purpose of clipper malware is to replace cryptocurrency wallet addresses copied by users with addresses controlled by the attacker. When users intend to transfer cryptocurrency funds, they often copy and paste wallet addresses from one application to another. Clipper malware hijacks this process, allowing attackers to redirect funds to their wallets instead of the intended recipients.
In this campaign, we observed the malware infection progressing through several stages. Upon downloading the file from these phishing sites, it arrives as a zip file containing a malicious executable serving as a dropper. This dropper then proceeds to drop a VB Script and a Batch script file onto the system.
Subsequently, it triggers the VB Script to download the XPhase clipper payload and then executes the Batch script to establish persistence and launch the clipper payload. The clipper payload is in the form of a DLL file. The figure below shows the infection chain.
Figure 1 – Infection Chain
During our investigations, we noted several domains, all of which were resolving to the IP address 31[.]31.198[.]206. This IP address is associated with an IP range managed by Reg.Ru Hosting in Russia.
Our research indicated the following phishing sites being used actively in this campaign:
The figure below shows the MetaMask phishing site.
Figure 2 – MetaMask Phishing Site
Further investigation into this domain revealed that an email address linked to it – acc@metamaskapp[.]space – was previously utilized in December 2022 during a phishing campaign aimed at harvesting passphrases of Metamask users. The email ID was documented in an article by Fraud News, indicating a potential connection to the same threat actor (TA) responsible for the current campaign.
Figure 3 – Previous Attacks
The figure below shows the CrytpoNotify phishing site. As the default language of this site is Russian, this site is likely meant to target Russian-speaking users.
Figure 4 – Cryptonotify Phishing Site
The figure below shows the WazirX phishing site.
Figure 5 – WazirX Phishing Site
WazirX is an Indian trusted Bitcoin and cryptocurrency exchange. The TA appears to be specifically focusing on Indian cryptocurrency users through the WazirX phishing site. During our investigations, we came across a recently established YouTube channel with only one video currently uploaded.
Interestingly, the title of this video includes the URL of the WazirX phishing site. Upon closer examination, we discovered that the TA had cloned this video from a YouTube account with a substantial subscriber base of over 150,000.
This particular YouTube channel frequently shares content such as videos and shorts pertaining to cryptocurrency topics. It seems that the TA exploited this tactic to potentially entice unsuspecting users into their malicious schemes.
Figure 6 – YouTube Account
The figure below shows the phishing site of Luno. Luno is a cryptocurrency exchange platform.
Figure 7 – Luno Phishing Site
The figure below shows the Coinsbot phishing site.
Figure 8 – CoinsBot Phishing Site
Currently, it’s challenging to make a definitive assessment of the coinsbot site. While its URL suggests a potential targeting of CoinSpot users, the user interface of this phishing site closely resembles that of the TradeSanta site.
You can see our comparison of both URLs below.
Figure 9 – URL Comparison
When a user downloads applications from the above-mentioned phishing sites, they receive a Zip file containing three components:
All these phishing sites are delivering XPhase Clipper. The figure below shows the content of Zip files.
Figure 10 – Content of Zip Files
For this analysis, we have examined the file downloaded from the domain wazirxapp[.]space. The executable file named WazirXv23.exe, as mentioned in the above image, has been identified as dropper malware.
The malware infection proceeds through several stages, ultimately leading to the execution of the XPhase clipper payload. The figure below shows the process tree.
Figure 11 – Process Tree
When executed by the user, this WazirXv23.exe file drops two additional files into the %temp% directory of the victim’s machine. The embedded files are as follows:
The figure below shows the embedded files.
Figure 12 – Embedded Files
The figure below shows the files dropped in the %temp% directory.
Figure 13 – Dropped Files
The clipper employs a deceptive tactic where it displays a fake error message to distract users as it proceeds with its malicious operations in the background. The error message falsely indicates a compatibility issue, suggesting that the executable cannot run on the victim’s system. This acts as camouflage for the malware and effectively draws attention away from its malicious operations.
Figure 14 – Error Message
Afterward, the dropper file executes the “runsys64.vbs” file using the following command:
“C:\Windows\System32\wscript.exe”
C:\Users\User_Name\AppData\Local\Temp\\runsys64.vbs
This VBS file is designed to download XPhase clipper from “hxxps[:]//wazirxapp[.]space/app/sysrun[.]dll”. It creates a folder named “sysupdates” in the %temp% directory and saves the clipper payload named runsys64.dll to it. The figure below shows the GET request.
Figure 15 – GET Request
This VBS script ensures that the XPHase clipper gets downloaded once by checking if the file with the same name already exists in the folder created above. By checking for the existence of the file, the malware ensures that it doesn’t repeatedly download the same file.
The figure below shows the VBS script.
Figure 16 – VBS Script (runsys64.vbs)
Now VBS script executes the batch script named “runsys64.bat”. This batch script sets up and executes the following command to add a registry entry for running the clipper payload on system startup. This is often seen in malware as a persistence mechanism to execute malicious code automatically on system boot.
Then, it runs the Clipper payload using Rundll32. The figure below shows the batch script.
Figure 17 – Batch Script (runsys64.bat)
The batch script executes the following command:
“C:\Users\User_Name\AppData\Local\Temp\sysupdates\runsys64.dll”,runsys64
This command executes the XPhase clipper payload and invokes the runsys64 function. The XPhase clipper payload is a 32-bit C++ compiled DLL file.
The runsys64 function includes the following regex patterns to target cryptocurrency addresses:
Cryptocurrency | Regular Expression |
Bitcoin (BTC) | ^(bc1|[13])[a-zA-HJ-NP-Z0-9]{25,39}$ |
Ethereum (ETH) | ^0x[a-fA-F0-9]{40,42}$ |
Tether (USDT) | ^T[A-Za-z1-9]{33} |
Dogecoin (DOGE) | ^(D|9)[5-9A-HJ-NP-U][1-9A-HJ-NP-Za-km-z]{32}$ |
These patterns are used to identify and replace crypto addresses found in the clipboard content with the TA’s crypto address.
It then enters a continuous loop where it retrieves the data of the clipboard using get_clipboard_content(). Upon finding a match, it replaces the user’s crypto address with TA’s crypto address by making a call to the set_clipboard_content() function. The figure below shows the hardcoded crypto addresses.
Figure 18 – TAs crypto addresses
The function then sleeps for 0.5 seconds before repeating the process. This looping mechanism allows for the continuous monitoring and potential manipulation of clipboard content, particularly targeting cryptocurrency-related data.
Figure 19 – runsys64 function.
This malware campaign targeting cryptocurrency users carries significant consequences across multiple fronts. Victims risk substantial financial loss as the clipper payload intercepts and modifies cryptocurrency wallet addresses, redirecting funds to the attackers’ wallets.
The TA behind the campaign exhibits a certain level of sophistication, employing deceptive websites posing as legitimate cryptocurrency applications to lure victims. Targeting Indian cryptocurrency users through platforms like WazirX suggests a specific focus on lucrative markets, indicative of regional knowledge or interests.
The TA’s persistence is evident through the reuse of domains associated with email addresses and tactics from previous phishing endeavors, highlighting adaptability and resourcefulness in sustaining campaigns over time. By leveraging content from reputable YouTube accounts with substantial subscriber bases, the TA demonstrates resourcefulness in propagating their malicious activities.
We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below:
Tactic | Technique | Procedure |
Resource Development (TA0042) | Establish Accounts (T1585) | Uses YouTube account for spreading the malicious URL |
Initial Access (TA0001) | Phishing (T1566) | This malware reaches users via phishing sites. |
Execution (TA0002) | User Execution (T1204) | The user needs to manually execute the file downloaded from the phishing site. |
Execution (TA0002) | Command and Scripting Interpreter: Visual Basic (T1059.005) | Uses Visual Basic Script to execute the batch script. |
Execution (TA0002) | Command and Scripting Interpreter: Windows Command Shell (T1059.003) | Uses batch script to execute the clipper payload. |
Persistence (TA0003) | Boot or Logon Autostart Execution (T1547.001) | Uses Registry run keys. |
Defense Evasion (TA0005) | Masquerading (T1036.008) | Downloads file disguised as a legitimate application. |
Collection (TA0009) | Clipboard Data (T1115) | Monitors clipboard data and replaces crypto address with their address. |
Impact (TA0040) | Financial Theft (T1657) | Swaps crypto address to transfer funds to TA’s crypto address. |
Indicators | Indicator Type | Description |
hxxps://metamaskapp[.]space hxxps://cryptonotify[.]ru hxxps://wazirxapp[.]space/ hxxps://lunoapp[.]space/ hxxps://coinsbot[.]space/ | URL | Phishing Sites |
c69045a04115dabc6fe35ce6429f46f867eba680f3c863ff920daa9d1480e7a1 e116fa2900a6e0f1aa448be9dacd06ffa84f2adb48f03ad5c5b02fb1fb29f0b3 1a4e8c51f4673c52677707f42437a181572715719763ebd5e841e07bd78b6003 ef28d77d1719b65fffa8849b36e7f96ba239021b0a5eebf441af21cc7dabaa25 8ba85e0f0b7edddb4c2facadfde7b25162481c24944fced9901f8a86c0df8d72 | SHA256 | Dropper |
3bd57de116ae8a4f7dc69ac6fa73358e2063ea2b9c90fcb5886c3ccd35f5c524 | SHA256 | XPhase Clipper |
6c8dc2c77bd5a4776348f7c63b81b3c9c1a521eda3099d19c3014db7a246bdde | SHA256 | runsys64.bat |
e6be2e040d1c7e3c745e3c53d85aa141b936a8269ca165daeb85dc49c06c07a | SHA256 | runsys64.vbs |
31[.]31.198[.]206 | IP | Malicious IP |
rule XPhase_Clipper{ meta:
author = "Cyble Research and Intelligence Labs"
description = "Detects XPhase Clipper"
date = "2024-02-07"
os = "Windows"
strings:
$a1 = "runsys64" fullword ascii
$a2 = "get_clipboard_content" fullword ascii
$a3 = "set_clipboard_content" fullword ascii
$a4 = "Replaced Matching Address" fullword nocase
condition:
uint16(0) == 0x5A4D and all of them
}