Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Byakugan (Infostealer) – Malware

April 14, 2024
Reading Time: 43 mins read
in Malware
Byakugan (Infostealer) – Malware

xr:d:DAF0KPtHT1Y:135,j:4162876839902964813,t:24041422

Byakugan

Type of Malware

Infostealer

Country of Origin

Unknown

Date of initial activity

2024

Associated Groups

Unknown

Targeted Countries

Portugues speaking countries

Motivation

Cryptocurrency mining and stealing information

Attack vectors

Malicious link on a PDF file

Targeted systems

Windows

Variants

7435f11e41735736ea95e0c8a66e15014ee238c3a746c0f5b3d4faf4d05215af

Overview

Byakugan is a node.js-based malware packed into its executable by pkg. In addition to the main script, there are several libraries corresponding to features. This includes setting up persistence, monitoring the victim’s desktop using OBS Studio, capturing screenshots, downloading cryptocurrency miners, logging keystrokes, enumerating and uploading files, and grabbing data stored in web browsers. Additionally, Byakugan can download extra files to perform its functions. These are stored in the default base path, % APPDATA%ChromeApplication, which is also used to store data created by Byakugan. Features Byakugan has the following features: Screen monitor Lib: streamer.js It uses OBS Studio to monitor the victim’s desktop. In a previous variant (7435f11e41735736ea95e0c8a66e15014ee238c3a746c0f5b3d4faf4d05215af), Byakugan downloaded the software from its domain. But this is not seen in this newer variant. Screen capture Lib: api.js Takes screenshots using Windows APIs. Miner Lib: miner.js The attacker can decide whether or not to continue mining when the victim is playing highly demanding games, which can impact performance. The attacker can also choose between mining with a CPU or a GPU to prevent the system from overloading. It downloads a variety of famous miners, such as Xmrig, t-rex, and NBMiner, and stores them in a folder named MicrosoftEdge under the base path. Keylogger Lib: api.js The keylogger stores its data in the kl folder located under the default path. File manipulation Lib: files.js This provides the functions for file uploading and exploring. Browser information stealer Lib: Browser.js Byakugan can steal information about cookies, credit cards, downloads, and auto-filled profiles. The data is stored in the bwdat folder under the base path. It can also inject cookies into a specified browser. In addition, there are some features that help Byakugan live as long as possible: Anti-analysis If the file name is not chrome.exe or is not located in the ChromeApplication folder, it will pretend to be a memory manager and close itself. In addition, it sets the path it uses to the Windows Defender’s exclusion path and allows files in the Windows firewall. Persistence It drops a configuration file for the task scheduler into the Defender folder under the base path, which makes it execute automatically when starting up.

Targets

Portuguese-speaking Windows users.

Techniques Used

The modus operandi of Byakugan exhibits resemblances to previously identified malware, utilizing deceptive methods to ensnare unsuspecting users. Disguised as an Adobe Reader installer within a Portuguese PDF, it prompts users to download and execute the malicious payload. Upon interaction with the PDF, victims are directed to click a concealed link, initiating a sequence of actions resulting in the deployment of a downloader dubbed “require.exe” and a benign installer to the system’s temporary directory. Subsequent steps involve the retrieval and execution of a DLL via DLL-hijacking to fetch the main module, “chrome.exe.” Byakugan’s primary module is sourced from a designated command-and-control (C2) server, potentially functioning as the attacker’s central control panel. With functionalities ranging from screen monitoring to cryptocurrency mining, Byakugan employs diverse libraries packed using node.js and pkg.

Significant Malware Campaigns

  • AhnLab SEcurity intelligence Center (ASEC) discovers distribution of an Infostealer disguised as the Adobe Reader installer. (March 2024)
References:
  • Infostealer Disguised as Adobe Reader Installer
  • Byakugan – The Malware Behind a Phishing Attack
  • Byakugan Infostealer Capabilities Revealed
Tags: BrazilByakuganCryptocurrenciesCryptominersInfostealersKeyloggersMalwareMicrosoftEdgeNode.jsPortugueseWindows
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial