{"id":48418,"date":"2023-06-12T06:00:35","date_gmt":"2023-06-12T10:00:35","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=48418"},"modified":"2023-06-13T12:36:54","modified_gmt":"2023-06-13T16:36:54","slug":"doublefinger-crypto-stealer","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/doublefinger-crypto-stealer\/48418\/","title":{"rendered":"Double trouble: crypto-stealing DoubleFinger"},"content":{"rendered":"<p>Cryptocurrencies are under attack from all sorts of criminal schemes \u2014 from mundane <a href=\"https:\/\/www.kaspersky.com\/blog\/bitcoin-cloud-mining-scam\/47616\/\" target=\"_blank\" rel=\"noopener nofollow\">Bitcoin mining scams<\/a> to grandiose <a href=\"https:\/\/www.kaspersky.com\/blog\/top-5-cryptocurrency-heists\/45945\/\" target=\"_blank\" rel=\"noopener nofollow\">cryptocurrency heists worth hundreds of millions of dollars<\/a>.<\/p>\n<p>For cryptocurrency owners, dangers lurk at literally every turn. Just recently we talked about <a href=\"https:\/\/www.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/48155\/\" target=\"_blank\" rel=\"noopener nofollow\">fake cryptowallets<\/a> \u2014 which look and work just like real ones but eventually steal all your money. Now <a href=\"https:\/\/securelist.com\/doublefinger-loader-delivering-greetingghoul-cryptocurrency-stealer\/109982\/\" target=\"_blank\" rel=\"noopener\">our experts have discovered<\/a> a brand new threat: a sophisticated attack using the DoubleFinger loader, which brings along its friends in the shape of the cryptostealer GreetingGhoul and the remote-access Trojan Remcos. But first things first..<\/p>\n<h2>How DoubleFinger installs GreetingGhoul<\/h2>\n<p>Our experts noted the high technical level of the attack and its multistage nature, by which it resembles an <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/apt-advanced-persistent-threats\/\" target=\"_blank\" rel=\"noopener\">advanced persistent threat (APT)<\/a> attack. A DoubleFinger infection starts with an email containing a malicious PIF file. Once the recipient opens the attachment, a chain of events begins, as follows:<\/p>\n<p><strong>Stage 1<\/strong>. DoubleFinger executes a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shellcode\" target=\"_blank\" rel=\"nofollow noopener\">shellcode<\/a> that downloads a file in PNG format from the image-sharing platform Imgur.com. But it\u2019s not really an image at all: the file contains multiple DoubleFinger components in encrypted form, which are used in subsequent stages of the attack. These include a loader for use in the second stage of the attack, a legitimate java.exe file, and another PNG file to be deployed later, at the fourth stage.<\/p>\n<p><strong>Stage 2<\/strong>. The DoubleFinger second-stage loader is run using the above-mentioned legitimate java.exe file, after which it executes another shellcode that downloads, decrypts and launches the third stage of DoubleFinger.<\/p>\n<p><strong>Stage 3<\/strong>. At this stage, DoubleFinger performs a series of actions to bypass security software installed on the computer. Next, the loader decrypts and launches the fourth stage, which is contained in the PNG file mentioned in the first stage. Incidentally, this PNG file contains not only the malicious code but also the image that lent the malware its name:<\/p>\n<div id=\"attachment_48421\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/06\/11154102\/doublefinger-crypto-stealer-01.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48421\" class=\"wp-image-48421 size-medium\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/06\/11154102\/doublefinger-crypto-stealer-01-300x298.png\" alt=\"The PNG file used by DoubleFinger with the fourth-stage malicious code\" width=\"300\" height=\"298\"><\/a><p id=\"caption-attachment-48421\" class=\"wp-caption-text\">The two fingers from which DoubleFinger got its name. (Note: some languages define a thumb as a finger, unlike in English)<\/p><\/div>\n<p><strong>Stage 4<\/strong>. At this step, DoubleFinger launches the fifth stage using a technique called <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/process-doppelganging\/\" target=\"_blank\" rel=\"noopener\">Process Doppelg\u00e4nging<\/a>, whereby it replaces the legitimate process with a modified one that contains the fifth-stage payload.<\/p>\n<p><strong>Stage 5<\/strong>. After all the above manipulations, DoubleFinger gets down to doing what it was designed for: loading and decrypting yet another PNG file \u2014 this one containing the final payload. This is the GreetingGhoul cryptostealer, which installs itself in the system and is scheduled in Task Scheduler to run daily at a certain time.<\/p>\n<h2>How GreetingGhoul steals cryptowallets<\/h2>\n<p>Once the DoubleFinger loader has done its job, GreetingGhoul comes directly into play. This malware contains two complementary components:<\/p>\n<ol>\n<li>one that detects cryptowallet applications in the system and steals data of interest to the attackers (private keys and seed phrases);<\/li>\n<li>one that overlays the interface of cryptocurrency applications and intercepts user input.<\/li>\n<\/ol>\n<div id=\"attachment_48426\" style=\"width: 359px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/06\/12051953\/doublefinger-crypto-stealer-02.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48426\" class=\"wp-image-48426\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/06\/12051953\/doublefinger-crypto-stealer-02.png\" alt=\"GreetingGhoul overrides the interface of cryptocurrency applications\" width=\"349\" height=\"500\"><\/a><p id=\"caption-attachment-48426\" class=\"wp-caption-text\">Example of GreetingGhoul overlaying the interface of cryptowallet applications<\/p><\/div>\n<p>As a result, the cybercriminals behind DoubleFinger are able to take control of the victim\u2019s cryptowallets and withdraw funds from them.<\/p>\n<p>Our experts found several DoubleFinger modifications, some of which \u2014 the icing on the cake \u2014 install the quite common (in cybercriminal circles) <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-access-trojan-rat\/\" target=\"_blank\" rel=\"noopener\">remote access Trojan<\/a> Remcos in the infected system. Its intended purpose is right there in the name \u2014 <strong>REM<\/strong>ote <strong>CO<\/strong>ntrol &amp; <strong>S<\/strong>urveillance. In other words, Remcos allows cybercriminals to observe all user actions and seize full control of the infected system.<br>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-fraud\"><\/p>\n<h2>How to protect your cryptowallets<\/h2>\n<p>Cryptocurrencies continue to be a magnet for cybercriminals, so all cryptoinvestors need to think hard about security. Speaking of which, we recommend reading our recent post <a href=\"https:\/\/www.kaspersky.com\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/47811\/\" target=\"_blank\" rel=\"noopener nofollow\">Protecting crypto investments: four key steps to safety<\/a>. Meanwhile, here\u2019s a summary of its key points:<\/p>\n<ul>\n<li><strong>Expect scams.<\/strong> The cryptocurrency world is full of scammers of every stripe, so constantly scan the horizon for booby traps, and always check and double-check everything meticulously.<\/li>\n<li><strong>Don\u2019t put all your eggs in one basket.<\/strong> Use a combination of hot wallets (for current transactions) and cold wallets (for long-term investments).<\/li>\n<li><strong>Learn how cybercriminals can <\/strong><a href=\"https:\/\/www.kaspersky.com\/blog\/five-threats-hardware-crypto-wallets\/47971\/\" target=\"_blank\" rel=\"noopener nofollow\">attack cold crypto wallets<\/a>.<\/li>\n<li><strong>Purchase from official sources:<\/strong> only buy hardware wallets from official and trusted sources, such as the manufacturer\u2019s website or authorized resellers; this is to avoid buying a <a href=\"https:\/\/www.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/48155\/\" target=\"_blank\" rel=\"noopener nofollow\">fake crypto wallet<\/a>.<\/li>\n<li><strong>Check for signs of tampering:<\/strong> before using a new hardware wallet, inspect it for any signs of tampering, such as scratches, glue, or mismatched components.<\/li>\n<li><strong>Verify the firmware:<\/strong> always verify that the firmware on the hardware wallet is legitimate and up-to-date. This can be done by checking the manufacturer\u2019s website for the latest version.<\/li>\n<li><strong>Never fill your recovery seed for a hardware wallet<\/strong> on a computer. A hardware wallet vendor will never you ask for that.<\/li>\n<li><strong>Protect passwords, keys and seed phrases.<\/strong> Use strong and unique passwords, <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">store them securely<\/a>, and, of course, <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptocurrency-giveaway-scam\/44346\/\" target=\"_blank\" rel=\"noopener nofollow\">never give your private keys or seed phrases<\/a> to anyone under any circumstances.<\/li>\n<li><strong>Protect yourself.<\/strong> Be sure to install <a href=\"https:\/\/www.kaspersky.com\/lp\/crypto-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team______\" target=\"_blank\" rel=\"noopener nofollow\">reliable protection<\/a> on all devices you use for managing cryptowallets.<\/li>\n<\/ul>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/Yg24TpA05xM?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.<\/p>\n","protected":false},"author":2706,"featured_media":48420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[1035,2640,3945,80,726,3244,422,723],"class_list":{"0":"post-48418","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-blockchain","9":"tag-cryptocurrencies","10":"tag-cryptowallets","11":"tag-fraud","12":"tag-scam","13":"tag-stealers","14":"tag-threats","15":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/doublefinger-crypto-stealer\/48418\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/doublefinger-crypto-stealer\/25795\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/doublefinger-crypto-stealer\/21236\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/doublefinger-crypto-stealer\/10753\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/doublefinger-crypto-stealer\/28489\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/doublefinger-crypto-stealer\/26094\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/doublefinger-crypto-stealer\/26408\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/doublefinger-crypto-stealer\/28901\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/doublefinger-crypto-stealer\/27805\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/doublefinger-crypto-stealer\/35546\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/doublefinger-crypto-stealer\/20700\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/doublefinger-crypto-stealer\/21384\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/doublefinger-crypto-stealer\/30219\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/doublefinger-crypto-stealer\/33997\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/doublefinger-crypto-stealer\/26410\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/doublefinger-crypto-stealer\/32104\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/doublefinger-crypto-stealer\/31787\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cryptocurrencies\/","name":"cryptocurrencies"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=48418"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48418\/revisions"}],"predecessor-version":[{"id":48436,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48418\/revisions\/48436"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48420"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=48418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=48418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=48418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}