Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

WhatsApp malware campaign delivers VBScript and MSI backdoors

0
Medium
Published: Tue Mar 31 2026 (03/31/2026, 16:35:36 UTC)
Source: AlienVault OTX General

Description

A sophisticated malware campaign targeting WhatsApp users has been observed since February 2026. The attack chain begins with malicious Visual Basic Script files sent via WhatsApp messages, which, when executed, initiate a multi-stage infection process. The malware uses renamed Windows utilities, retrieves payloads from trusted cloud services, and installs malicious MSI packages. The campaign employs social engineering, stealth techniques, and cloud-based payload hosting to establish persistence and escalate privileges on victim systems. The attackers utilize legitimate tools and trusted platforms to reduce visibility and increase the likelihood of successful execution. The final stage involves the delivery of unsigned MSI installers that enable remote access to compromised systems.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 18:54:09 UTC

Technical Analysis

This malware campaign exploits WhatsApp as a delivery vector, sending malicious Visual Basic Script (VBS) files to users. Upon execution, the VBS initiates a complex, multi-stage infection chain. The malware uses renamed Windows utilities to evade signature-based detection and downloads additional payloads hosted on trusted cloud platforms, complicating network-based detection. It installs malicious MSI installers that are unsigned, which serve as backdoors providing remote access and persistence on victim machines. The campaign employs social engineering tactics to convince users to execute the initial VBS file, leveraging the trust users place in WhatsApp communications. Privilege escalation is achieved through User Account Control (UAC) bypass techniques, allowing the malware to gain elevated rights without triggering alerts. The use of legitimate Windows tools and trusted cloud services reduces the likelihood of detection by traditional security solutions. The campaign also includes mechanisms for persistence, such as installing MSI packages that execute on system startup or via scheduled tasks. Indicators of compromise include numerous file hashes associated with the VBS and MSI payloads. The attack chain aligns with MITRE ATT&CK techniques including T1566 (Phishing), T1204.002 (User Execution: Malicious File), T1548.002 (UAC Bypass), T1543.003 (Windows Service), T1053 (Scheduled Task), T1055 (Process Injection), and T1078 (Valid Accounts). No CVE or known exploits in the wild are currently associated with this campaign, but its complexity and stealth make it a significant threat to Windows users receiving WhatsApp messages.

Potential Impact

The campaign poses a significant risk to organizations and individuals using WhatsApp on Windows platforms. Successful infection can lead to unauthorized remote access, allowing attackers to exfiltrate sensitive data, deploy additional malware, or move laterally within networks. The use of trusted cloud services for payload delivery complicates detection and response efforts. Privilege escalation and persistence mechanisms increase the difficulty of eradication, potentially leading to prolonged compromise. The social engineering component increases the likelihood of user execution, especially in environments where WhatsApp is widely used for communication. Organizations may experience data breaches, operational disruption, and reputational damage. The campaign's stealth techniques reduce visibility, increasing the risk of unnoticed infiltration. Although no widespread exploitation is reported yet, the campaign's sophistication suggests it could be leveraged for targeted attacks against high-value entities or broad opportunistic campaigns.

Mitigation Recommendations

1. Educate users about the risks of executing unsolicited or unexpected files received via WhatsApp or other messaging platforms, emphasizing caution with VBS and MSI files. 2. Implement application whitelisting to prevent execution of unsigned MSI installers and unauthorized scripts. 3. Deploy endpoint detection and response (EDR) solutions capable of detecting suspicious use of renamed Windows utilities and anomalous script execution. 4. Monitor network traffic for unusual connections to cloud service providers that may indicate payload retrieval. 5. Enforce strict User Account Control (UAC) policies and monitor for UAC bypass attempts. 6. Use multi-factor authentication (MFA) to protect accounts that could be leveraged for lateral movement. 7. Regularly audit scheduled tasks, services, and startup items for unauthorized changes. 8. Block or restrict the use of scripting environments like Windows Script Host (WSH) where not necessary. 9. Maintain up-to-date antivirus and antimalware signatures and heuristics tuned to detect script-based threats. 10. Establish incident response procedures to quickly isolate and remediate infected systems upon detection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.microsoft.com/en-us/security/blog/2026/03/31/whatsapp-malware-campaign-delivers-vbs-payloads-msi-backdoors/"]
Adversary
null
Pulse Id
69cbf7d8bafcc9a4dafa7cb2
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1304f43c5fddcf664ba0f068a5a7bc18
hash2d9ef700fb9ce1550ca73f50428fef87
hash3466746d84501cb07a9833057e835565
hash1fb0cb93de16671e3d4123438147549b47d10fdc
hash68e6071ec9210bce297d30c209ddf4026fd5a4f1
hashc8e5795f32b3c9d94b8aa3811fe3f61725fa5869
hash07c6234b02017ffee2a1740c66e84d1ad2d37f214825169c30c50a0bc2904321
hash15a730d22f25f87a081bb2723393e6695d2aab38c0eafe9d7058e36f4f589220
hash1735fcb8989c99bc8b9741f2a7dbf9ab42b7855e8e9a395c21f11450c35ebb0c
hash1f726b67223067f6cdc9ff5f14f32c3853e7472cebe954a53134a7bae91329f0
hash22b82421363026940a565d4ffbb7ce4e7798cdc5f53dda9d3229eb8ef3e0289a
hash57bf1c25b7a12d28174e871574d78b4724d575952c48ca094573c19bdcbb935f
hash5cd4280b7b5a655b611702b574b0b48cd46d7729c9bbdfa907ca0afa55971662
hash5eaaf281883f01fb2062c5c102e8ff037db7111ba9585b27b3d285f416794548
hash613ebc1e89409c909b2ff6ae21635bdfea6d4e118d67216f2c570ba537b216bd
hash630dfd5ab55b9f897b54c289941303eb9b0e07f58ca5e925a0fa40f12e752653
hash91ec2ede66c7b4e6d4c8a25ffad4670d5fd7ff1a2d266528548950df2a8a927a
hasha2b9e0887751c3d775adc547f6c76fea3b4a554793059c00082c1c38956badc8
hasha773bf0d400986f9bcd001c84f2e1a0b614c14d9088f3ba23ddc0c75539dc9e0
hashc9e3fdd90e1661c9f90735dc14679f85985df4a7d0933c53ac3c46ec170fdcfd
hashdc3b2db1608239387a36f6e19bba6816a39c93b6aa7329340343a2ab42ccd32d
hashdf0136f1d64e61082e247ddb29585d709ac87e06136f848a5c5c84aa23e664a0

Threat ID: 69cc1498e6bfc5ba1d3022ed

Added to database: 3/31/2026, 6:38:16 PM

Last enriched: 3/31/2026, 6:54:09 PM

Last updated: 4/1/2026, 3:50:58 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses