{"id":7271,"date":"2022-04-12T15:09:51","date_gmt":"2022-04-12T15:09:51","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=7271"},"modified":"2024-05-30T17:36:23","modified_gmt":"2024-05-30T17:36:23","slug":"meta-infostealer-malware","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/meta-infostealer-malware\/","title":{"rendered":"Meta Infostealer Malware Spread via Spam"},"content":{"rendered":"<p><strong>Meta<\/strong>, a newly crafted information-stealing malware, is distributed via a vast <strong>spam spree<\/strong>. The mechanism of the stealer injection within this campaign is already well-known. However, Meta is now a mainstream tool among hackers. Therefore, further attacks featuring this software but with different scenarios are inevitable. This article explains how the current malspam scheme works. We also share the story behind the info stealer.<\/p>\n<p><strong>READ ALSO<\/strong>: Spyware vs. Infostealer &#8211; <a href=\"\/spyware\">what&#8217;s the difference<\/a>?<\/p>\n<p>The information provided within the current article, including the images, is courtesy of <a href=\"https:\/\/twitter.com\/malware_traffic?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\" target=\"_blank\" rel=\"nofollow noopener\">Brad Duncan<\/a>, an independent cybersecurity analyst, the man behind the <a href=\"https:\/\/malware-traffic-analysis.net\" rel=\"nofollow noopener\" target=\"_blank\">malware-traffic-analysis.net<\/a> blog.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"Meta Infostealer Malware Spread via Spam\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n<h2 style=\"text-align:center\">Spam Campaign details<\/h2>\n<p>The Meta infostealer malware gets into the victim&#8217;s computer. It begins with an email with an <strong>attachment<\/strong>. Already a stay-away thing for the experienced ones, but someone might still buy into that. The bait is classic: you have received payment, and there is a little paperwork to be done before getting your money.<\/p>\n<figure id=\"attachment_7282\" aria-describedby=\"caption-attachment-7282\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-SCHEME-1.png\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-SCHEME-1.png\" alt=\"Meta Stealer Infection Scheme\" width=\"1069\" height=\"600\" class=\"size-full wp-image-7282\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-SCHEME-1.png 1069w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-SCHEME-1-300x168.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-SCHEME-1-1024x575.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-SCHEME-1-768x431.png 768w\" sizes=\"auto, (max-width: 1069px) 100vw, 1069px\" \/><\/a><figcaption id=\"caption-attachment-7282\" class=\"wp-caption-text\">This is a Meta Stealer Infection Scheme provided by Brad Duncan. Source: isc.sans.edu<\/figcaption><\/figure>\n<p>After the user downloads the attachment (an excel table within the current campaign,) the file will, just as expected, request allowance to execute <strong>macros<\/strong>. The sheets file features a DocuSign image to be more persuasive, although it is unnecessary since it is already downloaded. If the victim consents, enabled scripts (VBS) start downloading stuff from several sources.<\/p>\n<figure id=\"attachment_7285\" aria-describedby=\"caption-attachment-7285\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-EXCEL-1.png\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-EXCEL-1.png\" alt=\"Request for Macros\" width=\"1109\" height=\"615\" class=\"size-full wp-image-7285\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-EXCEL-1.png 1109w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-EXCEL-1-300x166.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-EXCEL-1-1024x568.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-EXCEL-1-768x426.png 768w\" sizes=\"auto, (max-width: 1109px) 100vw, 1109px\" \/><\/a><figcaption id=\"caption-attachment-7285\" class=\"wp-caption-text\">The attached excel file with a DocuSign seal asks for macros allowance. Source: isc.sans.edu<\/figcaption><\/figure>\n<p>The downloaded payload gets encoded with base64 (schemes presenting binary data as text) or undergoes byte reversal. Both methods increase the malware&#8217;s chances of passing undetected by antivirus programs. The fetched content constitutes *.dll and *.exe files.<\/p>\n<figure id=\"attachment_7284\" aria-describedby=\"caption-attachment-7284\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-REVERSE-DLL-1.png\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-REVERSE-DLL-1.png\" alt=\"Reversed bytes in the downloaded DLL\" width=\"798\" height=\"577\" class=\"size-full wp-image-7284\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-REVERSE-DLL-1.png 798w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-REVERSE-DLL-1-300x217.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-REVERSE-DLL-1-768x555.png 768w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><\/a><figcaption id=\"caption-attachment-7284\" class=\"wp-caption-text\">You can see the reversed byte order in the downloaded DLL. Source: isc.sans.edu<\/figcaption><\/figure>\n<p>The hacker&#8217;s plan succeeds as a malicious executable gets assembled on the victim&#8217;s computer, and it starts sending data to the server with 193[.]106[.]191[.]162 address. The file name is &#8216;qwveqwveqw,&#8217; and it even gets itself a system registry entry. Meta steals <strong>passwords<\/strong> for cryptocurrency wallets and web browsers, namely Chrome, Firefox, and Edge. By the way, Meta alters PowerShell and Windows Security settings, excluding *.exe files from antivirus examination.<\/p>\n<figure id=\"attachment_7283\" aria-describedby=\"caption-attachment-7283\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-TRAFFIC-1.png\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-TRAFFIC-1.png\" alt=\"Meta Stealer&#039;s Traffic\" width=\"1071\" height=\"589\" class=\"size-full wp-image-7283\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-TRAFFIC-1.png 1071w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-TRAFFIC-1-300x165.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-TRAFFIC-1-1024x563.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/META-TRAFFIC-1-768x422.png 768w\" sizes=\"auto, (max-width: 1071px) 100vw, 1071px\" \/><\/a><figcaption id=\"caption-attachment-7283\" class=\"wp-caption-text\">Meta-generated traffic. Source: isc.sans.edu<\/figcaption><\/figure>\n<h2 style=\"text-align:center\">Brief information on Meta malware<\/h2>\n<p>The hacker community quickly reacted to the suspension of <strong>Raccoon Stealer<\/strong> malware. Its operators stopped selling and supporting the tool as one of the developers became a victim of the war in Ukraine. Meta, advertised as the successor of RedLine, is one of several stealers that arrived to occupy the vacant niche. Its monthly price on the <strong>2Easy<\/strong> botnet marketplace is $125 and a lifetime subscription costs $1000. For a more thorough analysis of the Meta malware, consider reading the <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Windows+MetaStealer+Malware\/28522\/\" target=\"_blank\" rel=\"nofollow noopener\">original report<\/a> by Brad Duncan on the Internet Storm Center security forum.<\/p>\n<p><strong>RELATED<\/strong>: Why is <a href=\"\/blogs\/the-2easy-trading-platform-is-gaining-popularity\/\">the 2easy trading platform<\/a> gaining popularity?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meta, a newly crafted information-stealing malware, is distributed via a vast spam spree. The mechanism of the stealer injection within this campaign is already well-known. However, Meta is now a mainstream tool among hackers. Therefore, further attacks featuring this software but with different scenarios are inevitable. This article explains how the current malspam scheme works. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":7275,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[28,448,51,10,48,1360],"class_list":{"0":"post-7271","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-malware","9":"tag-meta","10":"tag-personal-information","11":"tag-spam","12":"tag-spyware","13":"tag-stealer"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/METAFI.jpg","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=7271"}],"version-history":[{"count":15,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7271\/revisions"}],"predecessor-version":[{"id":11663,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7271\/revisions\/11663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/7275"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=7271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=7271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=7271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}