SOCRadar® Cyber Intelligence Inc. | EvilExtractor Stealer Malware Attacks Peaked in March 2023
Home

Resources

Blog
Apr 24, 2023
3 Mins Read

EvilExtractor Stealer Malware Attacks Peaked in March 2023

EvilExtractor (or Evil Extractor), a data theft tool, is trending in Europe and the United States due to an uptick in attacks.

EvilExtractor is provided as if it is a legitimate tool on a subscription basis by its developer(s), Kodex; however, researchers have reported that the tool has been promoted to threat actors on various hacking forums since 2022.

According to Fortinet, the EvilExtractor stealer malware is used by attackers in the wild, and the statistics show that the malware’s deployment peaked in March 2023. 

What Is EvilExtractor?

EvilExtractor malware affects Windows systems, and attackers utilize it mainly for stealing browser data and other sensitive information. Kodex released the malware in October 2022 and has since been updating it.

A forum post to advertise EvilExtractor.
A forum post to advertise EvilExtractor.

Malicious actors can use the seven attack modules included in the EvilExtractor tool, such as credential extraction, ransomware, and Windows Defender bypassing, for $59 per month.

The following modules are part of the EvilExtractor version used in these attacks:

  • Date time checking
  • Anti-Sandbox
  • Anti-VM
  • Anti-Scanner
  • FTP server setting
  • Steal data
  • Upload Stolen data
  • Clear log
  • Ransomware

How Does EvilExtractor Affect?

Most infections were caused by a phishing campaign in which attackers dropped a Python executable. Fortinet discovered several attacks masquerading as account confirmation requests, each with a gzip-compressed executable attachment. This executable is designed to look like a legitimate PDF or Dropbox file.

When the target opens the file, a PyInstaller file is executed, which launches a .NET loader that launches an EvilExtractor executable using a base64-encoded PowerShell script.

The malware will check the system time and hostname on initial launch to determine whether it is running in a virtual environment or a sandbox, in which case it will exit.

The data-stealing module of EvilExtractor downloads three additional Python components: 

KK2023.zip: It extracts cookies from several web browsers and also collects browsing history and saved passwords from a wider range of programs. 

Confirm.zip: This module is a keylogger that records keyboard inputs and saves them in a local folder for later exfiltration. 

MnMs.zip: This component is a webcam extractor that secretly activates the webcam, captures videos or images, and uploads them to the attacker’s FTP server, which Kodex rents.

The malware also steals many types of documents and media files from the Desktop and Downloads folders, takes screenshots, and sends all the stolen data to the attackers.

Kodex Ransomware 

EvilExtractor also has a ransomware function that uses a PowerShell script extracted from the .Net loader. 

The loader contains the ‘Kodex ransomware’ module, which can download a file (“zzyy.zip“) from evilextractor[.]com

This tool utilizes 7-Zip to generate a password-secured archive of the victim’s files, making them inaccessible without the correct password.

Indicators of Compromise (IOC) Related to EvilExtractor

IP Addresses:

  • 45[.]87[.]81[.]184
  • 193[.]42[.]33[.]232

File Hash:

  • 352efd1645982b8d23a841107007c8b4b024eb6bb5d6b312e5783ce4aa62b685
  • 023548a5ce0de9f8b748a2fd8c4d1ae6c924c40acbde32e9599c868115d11f4e
  • 75688c32a3c1f04df0fc02491180c8079d7fdc0babed981f5860f22f5e118a5e
  • 826c7c112dd1ae80469ef81f5066003d7691a349e6234c8f8ca9637b0984fc45
  • b1ef1654839b73f03b73c4ef4e20ce4ecdef2236ec6e1ca36881438bc1758dcd
  • 17672795fb0c8df81ab33f5403e0e8ed15f4b2ac1e8ac9fef1fec4928387a36d

Stay Updated on IOCs with SOCRadar

SOCRadar is constantly looking for potential threats to deliver actionable intelligence that will safeguard your organization. Check out the Threat Actor/Malware tab on the platform to stay up to date on the most recent threat activity, mentions, and indicators of compromise. You can also utilize the Threat Feed/IOC service to stay informed of new trends through easily customizable collections.

SOCRadar’s Threat Actor and Malware Intelligence tab.