September 16, 2019 By Shane Schick 2 min read

A malware dropper dubbed WiryJMPer is masquerading as a virtual wallet and using challenging obfuscation techniques to infect machines with the Netwire remote-access Trojan (RAT) payload.

Researchers at Avast first disclosed details about the malware dropper, which they identified because the .RSRC section was three times larger than the WinBin2Iso binary for the wallet it purported to be, called ABBC Coin. In addition, a virtual wallet like ABBC Coin is normally used for managing cryptocurrencies, whereas the WinBin2Iso strings containing WiryJMPer are normally used to convert images from CDs, DVDs and Blu-ray discs.

Why WiryJMPer Flew Under the Radar

The researchers discovered that the ABBC Coin wallet’s window always shows up at startup, immediately following an unresponsive WinBin2Iso window. While a victim’s attention is focused on this front-end activity, WiryJMPer drops the Netwire RAT in the background. During this process, the JMP instruction moves directly into the .RSRC section rather than handle window messages, as it would in a more benign scenario.

The malware dropper’s creators used low-level code abstraction, along with control flow obfuscation and possibly a virtual machine based on a custom stack amid the RC4 key schedule.

The infection process consists of decrypting first the RC4 decryption password and .LNK filename, then the decoy binary — the ABBC Coin wallet — and, of course, the Netwire malware. At the same time, ntdll.dll is loaded into memory, along with the malware, and the decoy is saved to disk. By copying %APPDATA%abbcdriver.exe and creating a shortcut .LNK file in the startup folder, WiryJMPer can gain persistence on an infected machine, researchers said.

Ordinary users may be fooled by the decoy binary, the report added, which may explain why the malware dropper has not attracted attention until now.

How to Ward Off Threats Like WiryJMPer

Malware creators are always trying to find effective ways to sneak into machines, and organizations must do more than simply hope the power users among their teams will notice unusual attributes in a binary.

Security teams can help avoid being tricked by the likes of WiryJMPer by investing in a comprehensive vulnerability management solution that can model network topologies, ensure the latest software patches have been applied and more.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today