ViperSoftX Strikes Again: Evolving Malware Now Lurking in Pirated eBooks

ViperSoftX, a rapidly-evolving infostealer malware, now uses the .NET Common Language Runtime to hide its PowerShell commands, making it more dangerous. Trellix researchers highlight its newfound ability to evade detection by embedding commands within AutoIt scripts, targeting professionals through pirated eBooks.

Hot Take:

Who knew a snake could read? ViperSoftX is back, and it’s graduated from slithering through pirated software to lurking in bootleg eBooks. If only it could use its skills to write a bestseller instead of stealing your crypto!

Key Points:

  • ViperSoftX malware has evolved to use .NET CLR for obfuscating PowerShell commands.
  • It is now being spread through pirated eBooks, targeting even professionals.
  • The malware buries itself in fake JPG files and uses AutoIt scripts to execute commands.
  • ViperSoftX disables Windows security features like AMSI.
  • The malware’s goals appear to be shifting, potentially beyond just cryptocurrency theft.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here