Threat Advisory

Modular Node.js infostealer targeting developer tooling and wallets

Threat: Malware
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY:

The attackers delivered a modular information-stealing malware family through deceptive software distribution and social engineering to obtain high-value credentials and cryptocurrency artifacts. The attack vector relied on trojanized developer software and companion tooling presented as legitimate onboarding or application code; victims executed code from a cloned repository or an installed package in a development environment. Compromised hosts ran Node.js modules that executed child processes and installed third-party Node packages to capture input, images, and system metadata. The payloads targeted browser-stored credentials, wallet-related files and browser extension artifacts, and also collected clipboard content, typed input, and periodic screenshots. Collected artifacts and remotely executed commands were staged and sent to remote infrastructure over web-based application layer channels. The overall business impact observed in the analysis includes theft of account access and cryptocurrency funds, loss of confidentiality for sensitive documents, and exposure of credential material that can enable follow-on account takeover and financial loss.

A modular Node.js-based toolset that combines file-harvesting, remote shell functionality, credential harvesting, and input/capture modules. Initial compromise paths included installation of trojanized packages and installation/execution of a supplied codebase; a malicious code loader mechanism dynamically constructs modules from strings and executes them as child processes. Modules observed include an input-capture module that uses Node packages to record keystrokes and capture clipboard content, a screen-capture pipeline that transforms screenshots into web-friendly images, a file-harvester that enumerates drives and applies inclusion/exclusion patterns for targeted filenames and extensions, a browser-wallet/extension harvester that extracts extension files and saved browser data, and a remote shell that reports host attributes and then maintains a socket-based connection to receive commands. Communications employ application-layer web protocols on non-standard ports and use explicit upload endpoints for stolen artifacts. Anti-analysis features include virtualization/sandbox checks and anti-logging/anti-debugging logic inside modules.

The campaign blends supply-chain and social-engineering vectors with modular Node.js tooling focused on data theft and remote command execution. The convergence of several previously separate tool sets produced a combined capability set able to capture live input, extract browser secrets, persist remote command functionality, and stage files for upload. Use of trojanized development packages and a code-execution loader increases the probability of infection within development and crypto-centric user communities where running repository code and installing dependencies is routine. The toolset’s C2 pattern of switching from HTTP to WebSocket and using application-layer protocols for both commanding and data uploads positions it as a data-theft-centric threat that can be reused across multiple targets. The observed evolution into additional modules demonstrates expanding focus on high-value financial artifacts and on techniques to evade sandbox analysis.

THREAT PROFILE:

Tactic Technique ID Technique Sub Technique Name
Resource Development T1588.002 Obtain Capabilities Tool
T1583.001 Acquire Infrastructure Domains
T1584.005 Compromise Infrastructure Botnets
Initial Access T1189 Drive-by Compromise  -
Execution T1059.003 Command and Scripting Interpreter Windows Command Shell
T1059.007 Command and Scripting Interpreter JavaScript
Persistence T1547.001 Boot or Logon Autostart Execution Registry Run Keys / Startup Folder
Defense Evasion T1036.005 Masquerading Match Legitimate Name or Location
T1027.010 Obfuscated Files or Information Command Obfuscation
T1070.006 Indicator Removal Timestomp
Credential Access T1555.003 Credentials from Password Stores Credentials from Web Browsers
Discovery T1082 System Information Discovery  -
Collection T1119 Automated Collection  -
T1213.002 Data from Information Repositories Web Analytics Data
Command and Control T1090.004 Proxy Domain Fronting
T1071.001 Application Layer Protocol Web Protocols
Impact T1445 Generate Fraudulent Advertising Revenue  -

MBC MAPPING:

Objective Behavior ID Behavior
Initial Access E1204 User Execution
Execution E1059 Command and Scripting Interpreter
Persistence F0012 Registry Run Keys
F0013 Scheduled Tasks
Defense Evasion E1027 Obfuscated Files/Information
B0003 Dynamic Analysis Evasion
Discovery E1082 System Information Discovery
Credential Access E1055 Process Injection
Collection E1083 File/Directory Discovery
E1113 Screen Capture
E1510 Clipboard Modification
Command & Control B0031 Domain Name Generation
C0002 HTTP Communication
Lateral Movement E1105 Ingress Tool Transfer
Exfiltration E1020 Automated Exfiltration

REFERENCES:

The following reports contain further technical details:

 

crossmenu