Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle

Posted on July 5, 2025July 5, 2025 By CWS

Cybercriminals have more and more turned to respectable software program set up frameworks as automobiles for malware distribution, with Inno Setup rising as a most well-liked device for menace actors in search of to bypass safety measures.

This respectable Home windows installer framework, initially designed to simplify software program deployment, has develop into a classy supply mechanism for information-stealing malware campaigns that focus on browser credentials and cryptocurrency wallets.

The malicious marketing campaign exploits Inno Setup’s Pascal scripting capabilities to create seemingly respectable software program installers that conceal multi-stage malware payloads.

Malicious Inno-Setup Loader Marketing campaign (Supply – Splunk)

These weaponized installers masquerade as respectable purposes whereas executing complicated an infection chains that finally deploy RedLine Stealer, a broadly distributed information-stealing malware recognized for harvesting delicate information from compromised techniques.

Current evaluation by Splunk researchers has recognized a classy assault chain that leverages a number of evasion strategies to keep away from detection by safety instruments and sandbox environments.

The marketing campaign demonstrates superior tradecraft, using XOR encryption, anti-analysis measures, and legit system instruments to keep up persistence and evade detection all through the an infection course of.

The assault vector represents a big evolution in malware distribution techniques, as menace actors abuse the inherent belief customers place in software program installers.

By leveraging respectable frameworks like Inno Setup, attackers can distribute malware by varied channels together with phishing campaigns, compromised software program repositories, and malicious commercials with out triggering quick suspicion from customers or safety techniques.

Superior Evasion and Persistence Mechanisms

The malware’s subtle evasion technique begins with its Pascal script implementation, which makes use of XOR encryption to obfuscate important strings and instructions.

Upon execution, the installer performs complete atmosphere evaluation utilizing Home windows Administration Instrumentation (WMI) queries, particularly executing Choose * From Win32_Process the place Title= to establish processes related to malware evaluation instruments.

If evaluation instruments are detected, the installer instantly terminates to keep away from investigation.

HijackLoader and FinalPayload Decryption Routine (Supply – Splunk)

The marketing campaign employs a number of layers of sandbox evasion, together with filename sample matching and system profiling.

The malware checks for particular substrings within the installer’s filename, equivalent to “application_stable_release,” earlier than continuing with payload supply.

Moreover, it executes WMI queries like SELECT * FROM Win32_Processor and SELECT * FROM Win32_ComputerSystem to collect system data and establish digital machine environments generally used for malware evaluation.

For persistence, the malware creates hidden scheduled duties utilizing the command schtasks /Create /xml %temppercentlang WhatsAppSyncTaskMachineCore /f.

The payload is extracted to %APPDATApercentRoamingcontrolExplore and configured to execute mechanically upon system reboot.

The an infection chain culminates with DLL side-loading, the place a respectable software (ScoreFeedbackTool.exe) hundreds a trojanized QtGuid4.dll, which then decrypts and executes the HijackLoader element that finally deploys RedLine Stealer right into a spawned MSBuild.exe course of, successfully hiding the malicious payload inside a respectable Home windows growth device.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Delivery, Exploit, Hackers, Inno, Installer, Legitimate, Malware, Setup, Vehicle

Post navigation

Previous Post: Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence
Next Post: Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence

Related Posts

New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords Cyber Security News
NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution Cyber Security News
Gunra Ransomware New Linux Variant Runs Up To 100 Encryption Threads With New Partial Encryption Feature Cyber Security News
APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File Cyber Security News
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Cyber Security News
Malware Defense 101 – Identifying and Removing Modern Threats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News