New BHUNT Malware Targets your Crypto Wallets and Passwords

New BHUNT Malware Targets your Crypto Wallets and Passwords

A novel modular crypto-wallet stealing malware dubbed ‘BHUNT’ has been spotted targeting cryptocurrency wallet contents, passwords, and security phrases.

This is yet another crypto-stealer added to a large pile of malware that targets digital currency, but it is worth special attention due to its stealthiness.

Infection vector

The discovery and analysis of the new BHUNT malware come from Bitdefender, who shared their findings with Bleeping Computer before publishing.

Also Read: National Cybersecurity Awareness Campaign of Singapore: Better Cyber Safe than Sorry

To evade detection and triggering security warnings, BHUNT is packed and heavily encrypted using Themida and VMProtect, two virtual machine packers that hinder reverse-engineering and analysis by researchers.

The threat actors signed the malware executable with a digital signature stolen from Piriform, the makers of CCleaner. However, as the malware developers copied it from an unrelated executable, it’s marked as invalid due to a binary mismatch.

Invalid signature on the main executable
Source: Bitdefender

Bitdefender discovered that BHUNT is injected into explorer.exe and is likely delivered to the compromised system via KMSpico downloads, a popular utility for illegally activating Microsoft products.

KMS (Key Management Services) is a Microsoft license activation system that software pirates frequently abuse to activate Windows and Office products.

BleepingComputer recently reported a similar case of malicious KMSPico activators dropping cryptocurrency-wallet stealers to pirates’ systems.

This malware has been detected worldwide, with its greatest concentration of infected users in India, shown in the heat map below.

BHUNT victim heatmap
Source: Bitdefender

BHUNT modules

The main component of BHUNT is ‘mscrlib.exe,’ which extracts further modules that are launched on an infected system to perform different malicious behavior.

BHUNT’s execution flow
Source: Bitdefender

Each module is designed for a specific purpose ranging from stealing cryptocurrency wallets to stealing passwords. Using a modular approach, the threat actors can customize BHUNT for different campaigns or easily add new features.


Also Read: Revised Technology Risk Management Guidelines of Singapore

The current modules included in the BHUNT ‘mscrlib.exe’ executable are described below:

  • blackjack – steals wallet file contents, encodes it with base 64, and uploads it to the C2 server
  • chaos_crew – downloads payloads
  • golden7 – steals passwords from the clipboard and uploads the files to the C2 server
  • Sweet_Bonanza – steals information from browsers (Chrome, IE, Firefox, Opera, Safari)
  • mrpropper – cleans up traces (argument files)

The targeted wallets are Exodus, Electrum, Atomic, Jaxx, Ethereum, Bitcoin, and Litecoin.

As you can see in the code snippet below, the blackjack module is used to search for and steal cryptocurrency wallets on a user’s device and send them to a remote server under the attacker’s control.

Blackjack’s stealing function
Source: Bitdefender

Once the threat actor gains access to the wallet’s seed or configuration file, they can use it to import the wallet on their own devices and steal the contained cryptocurrency.

Although BHUNT’s focus is clearly financial, its information-stealing capabilities could enable its operators to gather much more than just crypto-wallet data.

“While the malware primarily focuses on stealing information related to cryptocurrency wallets, it can also harvest passwords and cookies stored in browser caches,” – explains Bitdefender’s report.

“This might include account passwords for social media, banking, etc. that might even result in an online identity takeover.”

To avoid being infected by BHUNT, you should simply avoid downloading pirated software, cracks, and illegitimate product activators.

As it’s been proven repeatedly, the projected financial savings from using pirated software are insignificant compared to the damage they can cause to infected systems.

Privacy Ninja

Recent Posts

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

3 weeks ago

Prioritizing Security Measures When Launching Webpage

Prioritizing Security Measures When Launching a Webpage That Every Organisation in Singapore should take note…

3 weeks ago

The Importance of Regularly Changing Passwords for Enhanced Online Security

Importance of Regularly Changing Passwords for Enhance Online Security that every Organisation in Singapore should…

4 weeks ago

Mitigating Human Errors in Organizations: A Comprehensive Approach to Data Protection and Operational Integrity

Comprehensive Approach to Data Protection and Operational Integrity that every Organsiation in Singapore should know…

4 weeks ago

The Importance of Pre-Launch Testing in IT Systems Implementation

Here's the importance of Pre-Launch Testing in IT Systems Implementation for Organisations in Singapore. The…

1 month ago

Understanding Liability in IT Vendor Relationships

Understanding Liability in IT Vendor Relationships that every Organisation in Singapore should look at. Understanding…

1 month ago