Security

Research

Cybercrooks get cozy with BoxedApp to dodge detection

Some of the biggest names in the game are hopping on the trend


Malware miscreants are increasingly showing a penchant for abusing legitimate, commercial packer apps to evade detection.

Jiří Vinopal, threat researcher at Check Point Research, says the trend has become especially popular over the past 12 months, and BoxedApp is one of the products that appear to be among the most favored.

Some of the most prevalent malware strains in the world are abusing BoxedApp to evade static analysis, the researcher claims. The vast majority are remote access trojans (RATs), such as Agent Tesla, AsyncRAT, and QuasarRat, although other cases have involved ransomware strains such as LockBit variants and infostealers such as Redline.

Chart depicts spike in malicious BoxedApp samples submitted to VirusTotal, courtesy of Check Point Research – click to enlarge

BoxedApp has been around for several years but the abuse of its SDK shot up from March 2023. It offers a range of benefits for attackers, a variety that Check Point Research believes outweigh the negatives.

Among the more notable features BoxedApp offers, ones that would interest bad actors especially are:

Application security expert Sean Wright told us: "The virtual processes may make it harder for anti-malware and other endpoint protection systems to detect the malware running via the BoxedApp SDK. Many of these products rely on the fact these processes run directly on the system as opposed to a virtualized process, which could then be hidden from the protection tooling.

"An easier way to perhaps think of this is a process running in a virtual machine, although it would likely be a bit more nuanced than this. So, from an attacker perspective, this helps prevent detection which would be one of their primary goals. The longer they go undetected the more data they could potentially gain access to."

BoxedApp programs do tend to generate a high false positive rate when scanned by antivirus solutions, according to Check Point Research. Even non-malicious apps packed using BoxedApp, such as a simple "Hello World" program, are flagged up by many antivirus engines, the report adds. 

An analysis of 1,200 genuinely malicious samples submitted to VirusTotal – the Google-owned malware platform that shows which vendors' solutions push alerts for different payloads – found that 25 percent were flagged up when packed using BoxedApp.

However, this can either be seen as a negative or a positive, depending on your outlook. While BoxedApp-packaged malware has a decent enough chance of triggering warnings in an organization's SOC, it can also play into attackers' hands as security teams may disable alerts relating to applications running the BoxedApp SDK.

"My advice to organizations is to limit the use of BoxedApp apps if possible," Wright said. "If you need to use these types of applications, look to leveraging controls such as signing of these applications, which as [Check Point Research's] writeup indicates can also help reduce the false positive rates."

Chart depicts malicious BoxedApp samples by country submitting to VirusTotal, courtesy of Check Point Research – click to enlarge

When looking deeper into the VirusTotal submissions, Vinopal found that the majority came from Turkey, the US, and Germany, although small percentages were reported from countries across the world.

"Most of the attributed malicious samples were used in attacks against financial institutions and government industries," the researcher blogged. "Using BoxedApp products to pack the malicious payloads enabled the attackers to lower the detection rate, harden their analysis, and use the advanced capabilities of BoxedApp SDK, e.g. Virtual Storage, that would normally take a long time to develop from scratch."

The Register approached BoxedApp for comment but it didn't immediately respond.

For those looking for ways to better detect abuses of BoxedApp, Check Point Research provides a set of Yara signatures in its report to help detect the packer while pulling out all the details and binary hashes of the packed app. ®

Send us news
2 Comments

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

RansomHub-linked EDR-killing malware spotted in the wild

Also: Your external-facing NetSuite sites need a review; five popular malware varieties for Q2, and more

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer

White House’s new fix for cyber job gaps: Serve the nation in infosec

Now do your patriotic duty and fill one of those 500k open roles, please?

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

110K domains targeted in 'sophisticated' AWS cloud extortion campaign

If you needed yet another reminder of what happens when security basics go awry

Microsoft mistake blows up admins' inboxes with fake malware alerts

Legitimate emails misclassified in software snafu

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure