Threat intelligence

Trojan Disguised as VPN Client Exploits Users with Fake Cisco AnyConnect Installer

by Security News

This week, the SonicWall Capture Labs threat research team analyzed a PDF file with a link to download a copy of a well-known VPN client. This PDF file appears to have been distributed via spam email and has a link to download Cisco AnyConnect. However, no VPN client was installed upon execution – instead, it downloaded a Trojan that constantly connected to various remote servers.

Infection Cycle

A PDF file with a link to download software is presented to an unsuspecting victim.

Fig1-PDF.png

Figure 1: PDF file with a link to download Cisco AnyConnect

Upon clicking on the download button, the user will be redirected to a download page and an archive file will be downloaded with a Microsoft Installer (MSI) file within.

Once the installer file is executed, a seemingly legitimate installation window appears.

Fig2-installation.png

Figure 2: Installation window of fake Cisco AnyConnect

However, another window appears prompting user to continue the download process on the Microsoft Store.

Fig3-promptforappstore.png

Figure 3: Prompt to open Microsoft Store

The Microsoft Store window is then opened to the official AnyConnect app.

Fig4-officialapp.png

Figure 4: Official Cisco AnyConnect from the Microsoft Store

The original installer file is still running on the background using msiexec.exe, however we noticed that it has constantly been connecting to various remote servers.

Fig5-remoteconnect.png

Figure 5: msiexec.exe connecting to various C2 servers

While no VPN client was installed during execution, this Trojan created a file which contained a PowerShell script in the %programdata% directory.

FIg6-powershell.png

Figure 6: PowerShell script created during installation

During our analysis, no data has been exchanged while constantly connecting to various remote servers.

SonicWall Capture Labs provides protection against this threat via the following signature:

• GAV: Malagent.ANC (Trojan)

This threat is also detected by SonicWall Capture ATP w/RTDMI and the Capture Client endpoint solutions.

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • Microsoft Security Bulletin Coverage for December 2024
    Read More
  • Critical Exploit in ProjectSend (CVE-2024-11680): Insights, Impact and Remediation
    Read More