Dotrunpex

Malware Profile Updated 24 days ago
Download STIX
Preview STIX
DotRunpeX is a rapidly evolving and highly stealthy .NET injector malware that has gained significant attention from both security analysts and threat actors. It employs the "Process Hollowing" method to distribute a wide variety of other malware strains, including AgentTesla, ArrowRAT, AsyncRat, AveMaria/WarzoneRAT, BitRAT, Formbook, LgoogLoader, Lokibot, NetWire, PrivateLoader, QuasarRAT, RecordBreaker – Raccoon Stealer, Redline, Remcos, Rhadamanthys, SnakeKeylogger, Vidar, and XWorm. The malware can infect systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. The malware is known for its ability to evade AV solutions using “procexp.sys” to close protected process handles. In addition to usual infection routes, DotRunpeX has been seen exploiting Google Ads, redirecting users searching for popular software like AnyDesk and LastPass to fake, malicious websites mimicking these software platforms. A unique case emerged where a DotRunpeX user targeted both regular victims and potential adversaries using a trojanized Redline builder with hidden DotRunpeX as 'extra'. The new version of DotRunpeX is also protected by a customized version of the KoiVM virtualizer and is highly configurable, with features such as disabling Anti-Malware services, Anti-VM, Anti-Sandbox, persistence settings, key for payload decryption, and UAC bypass methods. Cybersecurity researchers at Check Point have closely monitored and observed the real-world use and campaign-related infection paths of DotRunpeX malware. Their technical analysis revealed that DotRunpeX often follows the initial infection via distinct .NET loaders in phishing emails or disguised utility sites. The new version of DotRunpeX, compared to the old one, has more UAC Bypass techniques and uses simple XOR to decrypt the main payload to be injected. Furthermore, it abuses the procexp driver (Sysinternals) to kill protected processes, showing signs of being Russian based with the procexp driver name Иисус.sys translated as “jesus.sys”.
What's your take? (Question 1 of 5)
5300338c-dc71-493f-a7bb-ee335ed3932e Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Injector
Payload
Windows
Phishing
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
FormbookUnspecified
2
Formbook is a type of malware, a malicious software designed to exploit and damage computer systems. It can infiltrate your system through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold d
RedlineUnspecified
2
RedLine is a notorious malware, discovered in March 2020, that has been used extensively by threat actors to export personal information such as credentials, cryptocurrency wallets, and financial data to its command-and-control infrastructure. The malware infiltrates systems via suspicious downloads
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the Dotrunpex Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
Checkpoint
a year ago
DotRunpeX - demystifying new virtualized .NET injector used in the wild - Check Point Research
CERT-EU
9 months ago
DotRunpeX Malware Injector Widely Delivers Known Malware Families to Attack Windows
CERT-EU
8 months ago
Unpacking what's packed: DotRunPeX analysis
CERT-EU
9 months ago
DotRunpeX Malware Injector Widely Delivers Known Malware Families to Attack Windows | IT Security News
Checkpoint
a year ago
20th March – Threat Intelligence Report - Check Point Research