A phishing campaign, ongoing since March, has been actively targeting Microsoft Windows users in Europe and the U.S. The campaign uses a malcious tool called EvilExtractor (or Evil Extractor) that poses as an educational tool, developed by a company known as Kodex. Released in October 2022, the tool is being constantly upgraded for enhanced malicious capabilities.

EvilExtractor - A multi-module threat

According to Fortinet, EvilExtractor is developed to target Windows and steal data and files from endpoint devices. It comes with various modules that work using an FTP service.
  • This tool pretends to be a genuine file, such as a Dropbox or Adobe PDF, being distributed via phishing emails.
  • Once loaded, it uses PowerShell for carrying out malicious activities. 
  • This includes checking for the environment, including anti-virtual machines and VirusTotal’s malware scanning capabilities to avoid detection. 
  • The tool comes with a ransomware function, named Kodex Ransomware, for encrypting compromised systems.

Operational details 

The primary code of EvilExtractor is a PowerShell script that includes various modules, such as date time checking, anti-sandbox/VM/Scanner, FTP server setting, stealing data, clearing logs, and uploading stolen data.
  • The malware first checks if the system’s date is between November 9, 2022, and April 12, 2023. Subsequently, it compares the product model with a predefined list of 187 products, including VMWare, Hyper-V, VirusTotal or other virtual machines or sandboxes.
  • It then downloads three components, KK2023[.]zip (used for stealing browser data), Confirm[.]zip (a keylogger), and MnMs[.]zip (a webcam extractor).
  • It extracts files with certain extensions from the Desktop and Download folders, such as jpeg, jpg, png, and mp3. Further, it uses the CopyFromScreen command to capture a screenshot.

Conclusion

EvilExtractor appears a capable info-stealer that is equipped with multiple malicious features that are being upgraded by its authors for new functions and improved persistence. Thus, users should have awareness of this new info-stealer and beware of suspicious mail received from unknown sources.
Cyware Publisher

Publisher

Cyware