Threat intelligence, Network Security

Threat Actors Modify and Re-Create Commercial Software to Steal Users’ Information

by Sravan Ganachari

In collaboration with Microsoft Threat Intelligence (MSTIC), SonicWall has identified a deceptive campaign to distribute a hacked and modified version of SonicWall’s SSL VPN NetExtender application that closely resembles the official SonicWall NetExtender software. NetExtender enables remote users to securely connect and run applications on the company network. Users can upload and download files, access network drives, and use other resources as if they were on the local network. Security solutions from SonicWall (GAV: Fake-NetExtender [Trojan]) and Microsoft (TrojanSpy:Win32/SilentRoute.A) will flag the installer as malicious and enable proactive defenses.

The website impersonating the legitimate NetExtender is hosting a Trojanized version of SonicWall’s actual NetExtender version 10.3.2.27 (the latest release version), digitally signed by “CITYLIGHT MEDIA PRIVATE LIMITED.”

BlogPicture1.png
Figure 1: Malicious installer’s digital signature

The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server.

Technical Details

The threat actor modified the following component files, which are part of the NetExtender installer, to execute the application and send configuration information to a remote server:

  • NeService.exe (Modified file; digital signature is invalid)
  • NetExtender.exe (Modified file; no digital signature)

BlogPicture2.png
Figure 2: Comparison of malicious and clean installer components

Modifications to NeService.exe

This file is the SonicWall NetExtender Windows service used by the NetExtender application. It contains a function used to validate the digital certificates of NetExtender components. Upon successful validation, the program continues to execute; otherwise, it displays a validation failure message and exits.

image3.png
Figure 3: Function used to validate the application components

In the malicious installer, this file is patched at all locations where the function results are evaluated. The patch bypasses the check, allowing execution to continue regardless of validation results.

image4.png
Figure 4: Patching done by the threat actor in malicious NeService.exe

Modifications to NetExtender.exe

Additional code was added to send VPN configuration information to a remote server with the IP address 132.196.198.163 over port 8080. Once the VPN configuration details are entered and the “Connect” button is clicked, the malicious code performs its own validation before sending the data to the remote server. Stolen configuration information includes the username, password, domain, and more.

image5.png
Figure 5: Additional code added to NetExtender.exe

Mitigation

SonicWall and Microsoft have acted quickly to take down the impersonating websites and have had the installer’s digital certificate revoked.

It is strongly recommended that users download SonicWall applications only from trusted sources: sonicwall.com or mysonicwall.com.

SonicWall Capture ATP with RTDMI™ detects the malicious installer, and SonicWall Managed Security Services identifies and blocks it as:

  • GAV: Fake-NetExtender (Trojan)

Microsoft Defender Antivirus detects this as:

  • "SilentRoute" Trojan ("TrojanSpy:Win32/SilentRoute.A")

IOCs

Sha256:

  • d883c067f060e0f9643667d83ff7bc55a218151df600b18991b50a4ead513364 : Malicious NetExtender Installer
  • 71110e641b60022f23f17ca6ded64d985579e2774d72bcff3fdbb3412cb91efd : Malicious NEService.exe
  • e30793412d9aaa49ffe0dbaaf834b6ef6600541abea418b274290447ca2e168b: Malicious NetExtender.exe

 Network:

  • 132.196.198.163

Share This Article

An Article By

Sravan Ganachari

Software Dev Senior Principal Engineer
Sravan is a cybersecurity expert who specializes in analyzing harmful software, uncovering how it works and building tools to stop it across everything from common files to complex formats. With deep knowledge of how computers and networks function behind the scenes, he helps turn cutting-edge research into real-world protection, making the digital world safer for everyone.

Related Articles

  • Pre-Auth RCE Alert: Critical SSH Flaw in Erlang/OTP (CVE-2025-32433)
    Read More
  • Are You Leaving the Front Door Unlocked? Why You Need A Managed Firewall
    Read More