Hackers Disguise New JavaScript-Based Trojan as Game Cheat

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,143
Researchers discovered a new JavaScript-based and modular downloader Trojan camouflaged and distributed to targets in the form of game cheats via websites owned by its developers.

The malware was discovered by Yandex which subsequently sent it over to Doctor Web's research team for further analysis together with additional info on how the Trojan sample was distributed. The researchers were able to find that the Trojan — dubbed MonsterInstall — uses Node.js to execute itself on the victims' machines.

"When users attempt to download a cheat they download a password-protected 7zip archive to their computers. Inside there is an executable file; which upon launch, will download the requested cheats alongside other trojan’s components," says Doctor Web.
 

Dave Russo

Level 21
Verified
Top Poster
Well-known
May 26, 2014
1,052
Thanks for your post Silversurfer, Cheaters never prosper,and now they get hacked,thanks as the kids {family} are forever playing computer games here,would Shadow Defender be a good idea or can the damage be done before any restart? Also any chance Dr Web is just using this as a promotion for there product?
 

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,143
Cheaters never prosper,and now they get hacked,thanks as the kids {family} are forever playing computer games here,would Shadow Defender be a good idea or can the damage be done before any restart?
Shadow Defender can't help much in this case, because the Trojan try to download Cryptocurrency-Miner as we can read in the quotes below:
The malicious xmrig.exe process expanded and loaded from the xmrig.dll will send architecture, CPU, and RAM information to its operators and it will get a response containing the miner configuration in the form of a JSON file.
After the cryptominer loads the mining config file received from the C&C server, it will automatically execute and start surreptitiously mining TurtleCoin cryptocurrency.


Also any chance Dr Web is just using this as a promotion for there product?
Malware Analysis/Research is often done by other AV vendors like Kaspersky, ESET, Trend Micro and more..., so probably this report by Dr.Web is mainly for information purposes!
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top