Fake Software Installers Used to Deploy RATs and Crypto Mining Malware


Security researchers at Elastic Security Labs have uncovered an ongoing financially motivated campaign, tracked as REF1695, that has been distributing malware through fake software installers since at least November 2023. The operation combines cryptocurrency mining with Cost Per Action (CPA) fraud, redirecting victims to content locker pages disguised as software registration screens.

How the Attack Works

The infection chain begins with an ISO file, a disk image typically associated with legitimate software, which contains a protected loader and a text file. The instructions inside the file actually guide the victim into bypassing Microsoft Defender SmartScreen, the built-in Windows protection against unrecognized apps, by clicking "More info" and then "Run anyway."

Once executed, the loader calls PowerShell to disable Windows Defender antivirus protections across the board, then silently installs a newly identified malware called CNB Bot. To keep the victim unaware, a fake error message is displayed reading: "Unable to launch the application. Your system may not meet the required specifications."

What CNB Bot Does

CNB Bot acts as a secondary loader, it can download and run additional malicious payloads, update itself, and clean up traces of the infection. It communicates with attacker-controlled infrastructure via standard HTTP requests.

Other payloads deployed in related campaigns include PureRAT, PureMiner, and a custom XMRig loader used to mine Monero (XMR) cryptocurrency. Researchers also observed the use of WinRing0x64.sys, a legitimate but vulnerable signed Windows kernel driver, to gain low-level hardware access and fine-tune the CPU to boost mining performance — a technique seen in multiple cryptojacking campaigns over the years.

SilentCryptoMiner Also in the Mix

A separate campaign linked to the same threat actor was found dropping SilentCryptoMiner, which uses direct system calls to evade security tools, disables Windows Sleep and Hibernate modes to maximize mining uptime, and establishes persistence through a scheduled task. A watchdog process monitors the system and restores any deleted malicious files or persistence entries.

Across four tracked Monero wallets, the operation has accumulated approximately 27.88 XMR, equivalent to around $9,392, indicating a steady, if modest, financial return.

GitHub Used to Distribute Payloads

One notable detail: the attackers are using GitHub as a delivery platform, hosting malicious binaries across two identified accounts. This shifts the download step away from attacker-owned servers to a trusted platform, making detection more difficult for security tools that rely on infrastructure reputation.

Resources

Comments

Popular posts from this blog

The Hidden Lag Killing Your SIEM Efficiency

Critical Vulnerability in Veeam Backup & Replication Exposes Enterprises to Remote Code Execution

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware