Saturday, March 7, 2026
HomeCyber SecurityMalicious Notepad++ installers push StrongPity malware

Malicious Notepad++ installers push StrongPity malware

[ad_1]

Malicious Notepad++ installers push StrongPity malware

The delicate hacking group often known as StrongPity is circulating laced Notepad++ installers that infect targets with malware.

This hacking group, also referred to as APT-C-41 and Promethium, was beforehand seen distributing trojanized WinRAR installers in highly-targeted campaigns between 2016 and 2018, so this system isn’t new.

The current lure entails Notepad++, a very fashionable free textual content and supply code editor for Home windows utilized in a variety of organizations.

The invention of the tampered installer comes from a menace analyst often known as ‘blackorbird’ analysts, whereas Minerva Labs experiences on the malware.

Upon executing the Notepad++ installer, the file creates a folder named “Home windows Information” underneath C:ProgramDataMicrosoft, and drops the next three recordsdata:

  • npp.8.1.7.Installer.x64.exe – the unique Notepad++ set up file underneath C:UsersUsernameAppDataLocalTemp folder. 
  • winpickr.exe – a malicious file underneath C:WindowsSystem32 folder. 
  • ntuis32.exe – malicious keylogger underneath C:ProgramDataMicrosoftWindowsData folder

The set up of the code editor continues as anticipated, and the sufferer will not see something out of the unusual that might elevate suspicions.

Because the setup finishes, a brand new service named “PickerSrv” is created, establishing the malware’s persistence through startup execution.

Service created by the malware
Service created by the malware
Supply: Minerva

This service executes ‘ntuis32.exe’, which is the keylogger element of the malware, as an overlapped window (utilizing WS_MINIMIZEBOX type).

The keylogger data all person keystrokes and saves them to hidden system recordsdata dumped created within the ‘C:ProgramDataMicrosoftWindowsData’ folder. The malware additionally has the flexibility to steal recordsdata and different knowledge from the system.

This folder is constantly checked by ‘winpickr.exe,’ and when a brand new log file is detected, the element establishes a C2 connection to add the stolen knowledge to attackers.

As soon as the switch has been accomplished, the unique log is deleted to wipe the traces of malicious exercise.

Keep protected

If you want to use Notepad++, be sure that to supply an installer from the undertaking’s web site

The software program is out there on quite a few different web sites, a few of which declare to be the official Notepad++ portals however might embody adware or different undesirable software program.

The URL that was distributing the laced installer has been taken down following its identification by analysts, however the actors may shortly register a brand new one.

Observe the identical precautions with all software program instruments you are utilizing, regardless of how area of interest they’re, as subtle actors are notably desirous about specialised software program instances that are perfect for watering gap assaults.

On this case, the possibilities of detection from an AV device on the system can be roughly 50%, so utilizing up-to-date safety instruments is crucial too.



[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments