September 16, 2019 By Shane Schick 2 min read

A malware dropper dubbed WiryJMPer is masquerading as a virtual wallet and using challenging obfuscation techniques to infect machines with the Netwire remote-access Trojan (RAT) payload.

Researchers at Avast first disclosed details about the malware dropper, which they identified because the .RSRC section was three times larger than the WinBin2Iso binary for the wallet it purported to be, called ABBC Coin. In addition, a virtual wallet like ABBC Coin is normally used for managing cryptocurrencies, whereas the WinBin2Iso strings containing WiryJMPer are normally used to convert images from CDs, DVDs and Blu-ray discs.

Why WiryJMPer Flew Under the Radar

The researchers discovered that the ABBC Coin wallet’s window always shows up at startup, immediately following an unresponsive WinBin2Iso window. While a victim’s attention is focused on this front-end activity, WiryJMPer drops the Netwire RAT in the background. During this process, the JMP instruction moves directly into the .RSRC section rather than handle window messages, as it would in a more benign scenario.

The malware dropper’s creators used low-level code abstraction, along with control flow obfuscation and possibly a virtual machine based on a custom stack amid the RC4 key schedule.

The infection process consists of decrypting first the RC4 decryption password and .LNK filename, then the decoy binary — the ABBC Coin wallet — and, of course, the Netwire malware. At the same time, ntdll.dll is loaded into memory, along with the malware, and the decoy is saved to disk. By copying %APPDATA%abbcdriver.exe and creating a shortcut .LNK file in the startup folder, WiryJMPer can gain persistence on an infected machine, researchers said.

Ordinary users may be fooled by the decoy binary, the report added, which may explain why the malware dropper has not attracted attention until now.

How to Ward Off Threats Like WiryJMPer

Malware creators are always trying to find effective ways to sneak into machines, and organizations must do more than simply hope the power users among their teams will notice unusual attributes in a binary.

Security teams can help avoid being tricked by the likes of WiryJMPer by investing in a comprehensive vulnerability management solution that can model network topologies, ensure the latest software patches have been applied and more.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today