
The SonicWall Capture Labs threat research team recently identified a novel concealment method—a fresh variant of VMDetector Loader embedded within the pixel data of a seemingly ordinary JPEG file. Delivered through phishing emails packed as zipped archives, this campaign unravels through multiple layers of obfuscated scripts before finally deploying the FormBook malware.
The first file in this campaign—“RFQ_1000007012.VBS”—looks legitimate on the surface. It borrows clean code from the open-source project DocGenerator.vbs on GitHub. But beneath its seemingly harmless lines lies a dark twist: malicious code presence at the bottom of the file.

The malicious code is littered with junk characters, a deliberate move to sidestep signature-based detection. Its purpose is to download another VBScript from past.ee and execute it using ExecuteGlobal. Adding to its disguise, the download request includes a custom user-agent string: “MyCustomAgent/1.0.”

The second-stage VBScript continues the masquerade. It cleverly sandwiches the obfuscated payload between two legitimate files—Configurer.vbs at the top and VBSApp.vbs at the bottom, both sourced from the earlier mentioned GitHub project. This layout crafts the illusion of authenticity while cloaking the threat at its core.

Once deobfuscated, the intent becomes clear: execute a Base64-encoded PowerShell command that fuels the next leg of the attack.

The decoded PowerShell reaches out to archive.org, downloading what seems to be an innocent JPEG image. But appearances deceive. While the top portion of the file is a clean image, the bottom hides something far more sinister—VMDetector Loader, stealthily embedded in the pixel data of a Bitmap.
After download, the script scans the file for a specific sequence of bytes resembling a Bitmap header, marked by the classic “BM” signature and file size metadata. Once located, the embedded malware is extracted like a hidden message between the lines.


The extracted VMDetector Loader doesn’t end the journey—it sets the stage for the final payload. In this sample, that payload is FormBook, a well-known infostealer with a history of data theft and espionage. Depending on the campaign, other payloads may follow suit.
An analysis of VMDetector Loader binary can be found here.
This threat is detected by SonicWall Capture ATP with RTDMI.
Sha256:
Network:
URLs:
User-Agent:
[1] DocGenerator.vbs
[2] Configurer.vbs
[3] VBSApp.vbs
Share This Article

An Article By
An Article By
Sravan Ganachari
Sravan Ganachari