u/Critical_Capital_342

▲ 8 r/Piracy

A link to the full analysis I conducted is included below. What follows is only a brief summary, and I strongly recommend reading the full report to better understand the scope of what was analyzed instead of relying only on this post, since this is not the complete analysis.

https://old.reddit.com/r/PiracyBackup/comments/1sx8u7f/warning_possible_infostealer_found_in_
(The report, including the link to it on my GitHub, is available through that link. Since I cannot post it directly here, just click above and you will be redirected to the post on Old Reddit. Inside that post, you will find the link to my GitHub repository under the name “thebinaryanalyst73-bit.” I apologize for not being able to include the direct link in this post.)

This post is intended purely as a malware analysis and community safety warning for people downloading pirated 4d0be software. My goal is not to attack or accuse any individual or group. This is not an accusation, even if some of the observations may initially seem suggestive. It is a technical report based on independent forensic analysis and publicly available evidence, shared so that others can review the findings themselves.

Hello, and I hope this post does not violate the forum rules. I kindly ask the moderators to read this before removing it, because this is being posted strictly as a public security warning and technical analysis related to software distributed in piracy communities.

The file I analyzed was distributed as 4d0be Illustrator 2026 (v30.3) Multilingual on the uztracker tracker and was obtained through sources publicly associated with mOnkr-us releases. To avoid confusion regarding authenticity and source verification, I want to clarify that this was not downloaded from a random mirror, repost, or fake redistribution pretending to be related to mOnkr-us.

The sample was traced back to the Telegram channel publicly identified as:
Official mOnkr-us channel - (@)real_monkr()us - 15K subscribers

At the time of verification, the release links associated with the analyzed sample were being shared through that source. I am intentionally not posting direct download links, torrent links, or redistribution links here because I do not want to violate subreddit rules regarding piracy content distribution. This information is included only to clarify the origin chain of the analyzed sample and to reduce the chance of people dismissing the findings under the assumption that this came from an unrelated fake mirror or impersonation source.

I also want to make it absolutely clear that this is not a claim of intent and not a direct accusation against any individual, channel, or group. The purpose of this post is only to document what the sample did during analysis, how it behaved, and why it may pose a security risk. The wording here is meant to describe the evidence, not to assign blame.

The ISO I analyzed contained three files: AutoPlay.exe, which appeared to be a legitimate old 4d0be launcher; autorun.inf, which was harmless; and Set-up.exe, which turned out to be a fully functional infostealer.

What made this especially concerning is that the installer still behaves like a normal 4d0be installer. The software installs successfully while the malware runs silently in the background, giving the victim little to no indication that anything malicious occurred.

During reverse engineering and sandbox analysis, I found that the malware uses a multi-layer delivery chain designed to avoid antivirus detection. The malicious payload was hidden inside multiple nested execution layers and eventually executed through rundll32.exe using a .NET DLL named MSICustomActionDLL.dll.

The malware collected system information through WMI queries, gathered user and machine identifiers, contacted a live command-and-control server, and showed strong anti-VM and anti-debugging behavior intended to evade analysis environments.

The investigation also revealed persistence mechanisms involving fake Google updater services configured for automatic startup, suspicious process injection behavior, credential access activity, and communication with a live C2 endpoint hidden behind Cloudflare infrastructure.

Even more concerning, the same payload DLL hash and infrastructure were publicly linked by another researcher to a separate trojanized 4d0be Photoshop package distributed around the same timeframe, suggesting this may have been part of a broader multi-product campaign rather than an isolated incident.

Despite all of this behavior, the sample maintained zero detections across dozens of antivirus engines for a significant period of time, likely due to the combination of layered obfuscation, trusted installer abuse, anti-analysis techniques, and execution through legitimate Windows binaries.

All references, hashes, sandbox reports, extracted samples, infrastructure indicators, and sources used during the investigation are included at the end of the repository for independent verification. Anyone is free to review the evidence themselves, validate the findings independently, or perform additional analysis from their own perspective.

TL;DR: A torrent distributed as 4d0be Illustrator 2026 (v30.3) Multilingual from sources publicly associated with mOnkr-us releases contained a hidden infostealer inside Set-up.exe. The malware installs alongside the real software, steals system and user data, uses anti-VM and anti-debugging techniques, establishes persistence through fake Google updater services, and communicates with a live C2 server. The same payload was also linked to another trojanized 4d0be package, suggesting a potentially broader ongoing campaign.

I would genuinely appreciate seeing additional independent analysis from other researchers or experienced reverse engineers. Once again, this post is not intended as a definitive accusation against any specific person, channel, or group. It is simply the publication of technical findings from an investigation into a suspicious sample distributed through a widely trusted piracy source.

reddit.com
u/Critical_Capital_342 — 15 days ago

Link para a análise completa que realizei abaixo. O que segue aqui é apenas um breve resumo, e recomendo fortemente ler o relatório completo para compreender melhor a dimensão do que foi analisado, em vez de depender apenas desta publicação, já que esta não é a análise completa.

https://github.com/thebinaryanalyst73-bit/fake-adobe-installer-stealer-report/tree/Portuguese-(Brazil)

Este post tem como objetivo exclusivamente servir como uma análise de malware e um aviso de segurança para a comunidade, direcionado a pessoas que baixam softwares piratas da Adobe. Meu objetivo não é atacar ou acusar qualquer indivíduo ou grupo. Isto não é uma acusação, mesmo que algumas das observações possam parecer sugestivas à primeira vista. Trata-se de um relatório técnico baseado em análise forense independente e evidências publicamente disponíveis, compartilhado para que outras pessoas possam revisar os achados por conta própria.

Olá, e espero que este post não viole as regras do fórum. Peço gentilmente aos moderadores que leiam isto antes de removê-lo, porque esta publicação está sendo feita estritamente como um alerta público de segurança e uma análise técnica relacionada a softwares distribuídos em comunidades de pirataria.

O arquivo que analisei foi distribuído como Adobe Illustrator 2026 (v30.3) Multilingual no tracker uztracker e foi obtido através de fontes publicamente associadas aos releases do m0nkrus. Para evitar confusões relacionadas à autenticidade e verificação da origem, quero esclarecer que isto não foi baixado de um mirror aleatório, repostagem ou redistribuição falsa fingindo estar relacionada ao m0nkrus.

A amostra foi rastreada até o canal do Telegram publicamente identificado como:
Canal oficial do m0nkrus - (@)real_monkrus - 15 mil inscritos

No momento da verificação, os links do release associados à amostra analisada estavam sendo compartilhados através dessa fonte. Estou intencionalmente não publicando links diretos de download, links de torrent ou links de redistribuição aqui porque não quero violar as regras do subreddit relacionadas à distribuição de conteúdo pirata. Esta informação está incluída apenas para esclarecer a cadeia de origem da amostra analisada e reduzir a possibilidade de que as pessoas descartem os achados assumindo que isto veio de um mirror falso não relacionado ou de uma fonte de impersonação.

Também quero deixar absolutamente claro que isto não é uma alegação de intenção e nem uma acusação direta contra qualquer indivíduo, canal ou grupo. O objetivo deste post é apenas documentar o que a amostra fez durante a análise, como ela se comportou e por que ela pode representar um risco de segurança. A forma como isto foi escrito tem como objetivo descrever as evidências, não atribuir culpa.

A ISO que analisei continha três arquivos: AutoPlay.exe, que aparentava ser um launcher legítimo antigo da Adobe; autorun.inf, que era inofensivo; e Set-up.exe, que acabou sendo um infostealer totalmente funcional.

O que tornou isso especialmente preocupante é que o instalador ainda se comporta como um instalador normal da Adobe. O software é instalado com sucesso enquanto o malware é executado silenciosamente em segundo plano, dando à vítima pouco ou nenhum indício de que algo malicioso aconteceu.

Durante a engenharia reversa e análise em sandbox, descobri que o malware utiliza uma cadeia de execução em múltiplas camadas projetada para evitar detecção por antivírus. A carga maliciosa estava escondida dentro de várias camadas encadeadas de execução e eventualmente era executada através do rundll32.exe utilizando uma DLL .NET chamada MSICustomActionDLL.dll.

O malware coletava informações do sistema através de consultas WMI, obtinha identificadores do usuário e da máquina, se comunicava com um servidor ativo de comando e controle (C2) e demonstrava forte comportamento anti-VM e anti-debugging com o objetivo de evitar ambientes de análise.

A investigação também revelou mecanismos de persistência envolvendo falsos serviços de atualização do Google configurados para inicialização automática, comportamento suspeito de injeção de processos, atividades de acesso a credenciais e comunicação com um endpoint C2 ativo oculto atrás da infraestrutura da Cloudflare.

Ainda mais preocupante, o mesmo hash da DLL da carga maliciosa e a mesma infraestrutura foram publicamente associados por outro pesquisador a um pacote trojanizado separado do Adobe Photoshop distribuído aproximadamente no mesmo período, sugerindo que isso pode ter feito parte de uma campanha mais ampla envolvendo múltiplos produtos, e não um incidente isolado.

Apesar de todo esse comportamento, a amostra manteve zero detecções em dezenas de mecanismos antivírus durante um período significativo de tempo, provavelmente devido à combinação de ofuscação em múltiplas camadas, abuso de instaladores confiáveis, técnicas anti-análise e execução através de binários legítimos do Windows.

Todas as referências, hashes, relatórios de sandbox, amostras extraídas, indicadores de infraestrutura e fontes utilizadas durante a investigação estão incluídos ao final do repositório para verificação independente. Qualquer pessoa pode revisar as evidências por conta própria, validar os achados independentemente ou realizar análises adicionais sob sua própria perspectiva.

TL;DR: Um torrent distribuído como Adobe Illustrator 2026 (v30.3) Multilingual a partir de fontes publicamente associadas aos releases do m0nkrus continha um infostealer oculto dentro do arquivo Set-up.exe. O malware é instalado junto com o software legítimo, rouba dados do sistema e do usuário, utiliza técnicas anti-VM e anti-debugging, estabelece persistência através de falsos serviços de atualização do Google e se comunica com um servidor C2 ativo. A mesma carga maliciosa também foi associada a outro pacote trojanizado da Adobe, sugerindo uma campanha potencialmente mais ampla e ainda em andamento.

Nota extra: Eu teria publicado isto em comunidades maiores como o r/Piracy ou subreddits similares, mas como minha conta é muito nova e anteriormente eu não possuía uma conta no Reddit, atualmente não atendo aos requisitos de publicação devido às restrições de idade da conta e karma. Se alguém quiser republicar isto em outros lugares para dar mais visibilidade ou permitir revisão independente adicional, sinta-se à vontade para fazê-lo.

Eu realmente apreciaria ver análises independentes adicionais feitas por outros pesquisadores ou engenheiros reversos experientes. Mais uma vez, este post não tem a intenção de ser uma acusação definitiva contra qualquer pessoa, canal ou grupo específico. Trata-se simplesmente da publicação de achados técnicos provenientes de uma investigação sobre uma amostra suspeita distribuída através de uma fonte de pirataria amplamente confiável.

reddit.com
u/Critical_Capital_342 — 17 days ago

Link to the full analysis I conducted is below. What follows here is only a brief summary, and I strongly recommend reading the full report to better understand the scope of what was analyzed instead of relying only on this post, since this is not the complete analysis.

https://github.com/thebinaryanalyst73-bit/fake-adobe-installer-stealer-report

This post is intended purely as a malware analysis and community safety warning for people downloading pirated Adobe software. My goal is not to attack or accuse any individual or group. This is not an accusation, even if some of the observations may appear suggestive at first glance. It is a technical report based on independent forensic analysis and publicly available evidence, shared so that others can review the findings themselves.

Hello, and I hope this post does not violate the forum rules. I kindly ask the moderators to read this before removing it, because this is being posted strictly as a public security warning and technical analysis related to software distributed in piracy communities.

The file I analyzed was distributed as Adobe Illustrator 2026 (v30.3) Multilingual on the uztracker tracker and was obtained through sources publicly associated with m0nkrus releases. To avoid confusion regarding authenticity and source verification, I want to clarify that this was not downloaded from a random mirror, repost, or fake redistribution pretending to be related to m0nkrus.

The sample was traced back to the Telegram channel publicly identified as:
Official m0nkrus channel - (@)real_monkrus - 15K subscribers

At the time of verification, the release links associated with the analyzed sample were being shared through that source. I am intentionally not posting direct download links, torrent links, or redistribution links here because I do not want to violate subreddit rules regarding piracy content distribution. This information is included only to clarify the origin chain of the analyzed sample and to reduce the possibility of people dismissing the findings under the assumption that this came from an unrelated fake mirror or impersonation source.

I also want to make it absolutely clear that this is not a claim of intent and not a direct accusation against any individual, channel, or group. The purpose of this post is only to document what the sample did during analysis, how it behaved, and why it may pose a security risk. The wording here is meant to describe the evidence, not to assign blame.

The ISO I analyzed contained three files: AutoPlay.exe, which appeared to be a legitimate old Adobe launcher, autorun.inf, which was harmless, and Set-up.exe, which turned out to be a fully functional infostealer.

What made this especially concerning is that the installer still behaves like a normal Adobe installer. The software installs successfully while the malware runs silently in the background, giving the victim little to no indication that anything malicious happened.

During reverse engineering and sandbox analysis, I found that the malware uses a multi-layer delivery chain designed to avoid antivirus detection. The malicious payload was hidden inside multiple nested execution layers and eventually executed through rundll32.exe using a .NET DLL named MSICustomActionDLL.dll.

The malware collected system information through WMI queries, gathered user and machine identifiers, contacted a live command-and-control server, and showed strong anti-VM and anti-debugging behavior intended to evade analysis environments.

The investigation also revealed persistence mechanisms involving fake Google updater services configured for automatic startup, suspicious process injection behavior, credential access activity, and communication with a live C2 endpoint hidden behind Cloudflare infrastructure.

Even more concerning, the same payload DLL hash and infrastructure were publicly linked by another researcher to a separate trojanized Adobe Photoshop package distributed around the same timeframe, suggesting this may have been part of a broader multi-product campaign rather than an isolated incident.

Despite all of this behavior, the sample maintained zero detections across dozens of antivirus engines for a significant period of time, likely due to the combination of layered obfuscation, trusted installer abuse, anti-analysis techniques, and execution through legitimate Windows binaries.

All references, hashes, sandbox reports, extracted samples, infrastructure indicators, and sources used during the investigation are included at the end of the repository for independent verification. Anyone is free to review the evidence themselves, validate the findings independently, or perform additional analysis from their own perspective.

TL;DR: A torrent distributed as Adobe Illustrator 2026 (v30.3) Multilingual from sources publicly associated with m0nkrus releases contained a hidden infostealer inside Set-up.exe. The malware installs alongside the real software, steals system and user data, uses anti-VM and anti-debugging techniques, establishes persistence through fake Google updater services, and communicates with a live C2 server. The same payload was also linked to another trojanized Adobe package, suggesting a potentially broader ongoing campaign.

Extra note: I would have posted this in larger communities such as r/Piracy or similar subreddits, but since my account is very new and I previously did not have a Reddit account, I currently do not meet the posting requirements due to account age and karma restrictions. If anyone wants to crosspost this elsewhere for additional visibility or independent review, feel free to do so.

I would genuinely appreciate seeing additional independent analysis from other researchers or experienced reverse engineers. Once again, this post is not intended as a definitive accusation against any specific person, channel, or group. It is simply the publication of technical findings from an investigation into a suspicious sample distributed through a widely trusted piracy source.

Edit: Fixed a formatting error in the post.

reddit.com
u/Critical_Capital_342 — 17 days ago