Threat Advisory

EvilAI Malware Campaign Leveraging AI-Generated Code and Fake Applications

Threat: Malware campaign
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY:

EvilAI is a rapidly evolving malware campaign that blends social engineering, realistic user interfaces, and AI-generated code to disguise itself as legitimate applications. These fake apps often present themselves as productivity tools or AI-based utilities, complete with polished visuals, valid digital signatures, and functional features that reduce suspicion. The campaign has a global footprint, impacting regions across Europe, the Americas, and Asia, with industries such as government, healthcare, manufacturing, and retail all affected. Its main goals include credential theft, persistence within infected systems, and preparing ground for further payload delivery. By mimicking trusted applications in both design and functionality, EvilAI exploits user confidence and evades early detection. The widespread presence of this campaign within a short observation window highlights both its speed and adaptability. This evolution represents a clear turning point in how AI is increasingly being used not only to defend systems but also to craft sophisticated attacks, expanding the threat landscape for organizations of all sizes.

 

EvilAI employs multiple techniques to infiltrate and remain hidden in target environments. It is distributed through deceptive websites, fake vendor portals, manipulated search results, and social media promotions. Applications often appear genuine, sometimes with partial legitimate functionality, and are signed with digital certificates tied to disposable or newly created companies. Once installed, the malware drops hidden JavaScript payloads into temporary directories, launching them through node.exe while displaying a legitimate-looking interface to the victim. Persistence is secured through scheduled tasks, registry Run-keys, and shortcuts disguised as system components. The malware gathers intelligence by checking installed security software via registry and WMI queries, and it extracts stored browser credentials after forcibly terminating browser processes. Heavy obfuscation, including Unicode escape encoding, meaningless variable names, and control flow tricks, complicates analysis. Communication with command-and-control servers is encrypted with AES-256, and the malware operates modularly—capable of downloading payloads, executing commands, and manipulating system settings—allowing attackers to adapt its use for different objectives.

 

EvilAI functions as a versatile stager, providing attackers with persistence, credential theft, and remote control that can later facilitate delivery of more damaging payloads. The exact nature of its secondary tools varies, making it harder to predict or block with signature-based defenses alone. Its ability to appear legitimate—through convincing design, functional features, and signed executables—challenges traditional assumptions about what software can be trusted. Organizations need to move beyond reliance on surface-level signals of legitimacy, instead adopting layered security measures that combine behavioral detection, AI-assisted monitoring, and strict control over software installation sources. Proactive monitoring for unusual processes, suspicious task scheduler entries, and unexplained network communications is critical. More broadly, EvilAI illustrates how attackers are now using AI to refine their operations, making their malware stealthier, more adaptive, and more difficult to analyze. Defenders must therefore adopt equally innovative methods—prioritizing proactive threat hunting, rapid response, and comprehensive visibility—to counter increasingly intelligent and deceptive malware campaigns.

THREAT PROFILE:

Tactic Technique ID Technique Sub-Technique
Initial Access T1189 Drive-by Compromise -
T1195.002 Supply Chain Compromise Compromise Software Supply Chain
T1078 Valid Accounts -
Execution T1059.007 Command and Scripting Interpreter JavaScript
T1059.008 Command and Scripting Interpreter Network Device CLI
T1047 Windows Management Instrumentation -
Persistence T1053.005 Scheduled Task/Job Scheduled Task
T1547.001 Boot or Logon Autostart Execution Registry Run Keys / Startup Folder
T1547.009 Boot or Logon Autostart Execution Shortcut Modification
Defense Evasion T1027 Obfuscated Files or Information -
T1562.001 Impair Defenses Disable or Modify Tools
Credential Access T1555.003 Credentials from Password Stores Credentials from Web Browsers
T1003.001 OS Credential Dumping LSASS Memory
Discovery T1012 Query Registry -
Collection T1114.002 Email Collection Remote Email Collection
Command & Control T1071.001 Application Layer Protocol Web Protocols
T1573.001 Encrypted Channel Symmetric Cryptography
Impact T1490 Inhibit System Recovery -

MBC MAPPING:

Objective Behavior ID Behavior
Execution E1204 User Execution
Anti-Static Analysis B0032 Executable Code Obfuscation
Defense Evasion F0005 Hidden Files and Directories
Anti-Static Analysis B0032 Executable Code Obfuscation
Collection E1560 Archive Collected Data
Communication Micro-objective C0002 HTTP Communication

 

REFERENCES:

The following reports contain further technical details:

crossmenu