HomeTopics 1Advanced Persistent ThreatFake Telegram Malware Campaign Exploits Typosquatting to Deploy Stealthy Multi-Stage Loader

Fake Telegram Malware Campaign Exploits Typosquatting to Deploy Stealthy Multi-Stage Loader

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

A sophisticated malware campaign is actively targeting users through fake Telegram download websites, using advanced evasion techniques to bypass security controls and establish persistent access on infected systems.

According to a detailed analysis published by K7 Computing – available in the original research here – attackers are leveraging typosquatted domains to trick users into downloading a malicious installer disguised as the popular messaging app Telegram.

A Deceptive Entry Point: Fake Telegram Downloads

At the heart of this campaign is a classic yet highly effective tactic: typosquatting.

Threat actors created domains such as:

  • telegrgam[.]com
  • telefgram[.]com
  • tejlegram[.]com

These sites closely mimic the legitimate Telegram download page, making it easy for unsuspecting users to download what appears to be a standard installer — tsetup-x64.6.exe.

But behind the familiar filename lies a multi-stage malware loader.

Inside the Infection Chain

Once executed, the fake installer initiates a complex attack sequence designed to evade detection and maintain persistence.

Stage 1: System Reconnaissance & Defense Evasion

The malware begins by scanning running processes, likely to detect security tools or prior infections. It then executes a critical step:

  • Disables antivirus visibility by adding all system drives (C:, D:, etc.) to Microsoft Defender exclusion lists via PowerShell.

This effectively blinds native security defenses.

Stage 2: Payload Staging & Persistence

The malware drops multiple files into:

C:\Users\<User>\AppData\Roaming\Embarcadero\

To avoid suspicion, it uses legitimate-looking file names and even deploys a real Telegram installer, ensuring the victim sees a normal installation process.

It also creates registry entries to:

  • Mark the system as infected
  • Avoid reinfection
  • Maintain persistence

Stage 3: Fileless Execution via DLL Loader

The attack escalates with the execution of a malicious DLL using rundll32.exe, a legitimate Windows utility.

However, instead of storing the payload directly, the malware:

  • Reads encoded data from XML files (e.g., GPUCache.xml)
  • Reconstructs a hidden executable payload
  • Loads it directly into memory

This technique – known as reflective loading – allows attackers to bypass traditional file-based detection.

Stage 4: Command-and-Control (C2) Communication

Once active, the malware establishes a persistent connection to attacker-controlled infrastructure, including:

  • IP: 27.50.59.77:18852
  • Domain: jiijua[.]com

Through this channel, attackers can:

  • Execute remote commands
  • Exfiltrate data
  • Push updated payloads dynamically

This transforms the infection into a fully controllable remote access foothold.

Why This Matters Globally

This campaign highlights a dangerous convergence of social engineering + fileless malware + SaaS impersonation.

Applications like Telegram are widely used across:

  • Enterprises
  • Governments
  • Financial institutions
  • Remote work environments

In regions such as the Middle East and Africa — where mobile-first communication and app-based ecosystems are rapidly growing — such campaigns can have amplified impact.

The use of:

  • Trusted brand impersonation
  • Legitimate installers
  • Memory-based execution

…makes this attack particularly difficult to detect with traditional security tools.

10 Recommended Security Actions

To mitigate risks from similar campaigns, organizations should:

  1. Enforce software download policies, only allow installations from verified official sources.
  2. Implement DNS and web filtering to block typosquatted domains.
  3. Monitor PowerShell activity for suspicious commands, especially Defender exclusions.
  4. Enable endpoint detection and response (EDR) for behavioral analysis.
  5. Restrict use of rundll32.exe and monitor abnormal DLL execution.
  6. Audit Windows Defender configurations regularly for unauthorized exclusions.
  7. Inspect registry changes for persistence mechanisms.
  8. Deploy network monitoring tools to detect unusual outbound connections.
  9. Conduct user awareness training to recognize fake download pages via Saintynet Cybersecurity.
  10. Adopt advanced threat detection solutions and continuous monitoring strategies with Saintynet Cybersecurity to detect fileless and memory-based attacks.

For deeper insights into evolving malware techniques, explore related threat analyses on CyberCory.

Industry Insight: The Rise of Fileless & Deceptive Malware

This campaign is a textbook example of how attackers are evolving beyond traditional malware delivery.

Key trends include:

  • Fileless execution to evade antivirus tools
  • Living-off-the-land binaries (LOLBins) like rundll32.exe
  • Dynamic payload updates via C2 servers
  • Brand impersonation using typosquatting

The result: attacks that are quieter, stealthier, and significantly harder to detect.

Conclusion

The fake Telegram malware campaign uncovered by K7 Computing underscores a critical reality, attackers are combining deception with advanced technical evasion to compromise systems at scale.

By exploiting user trust and leveraging multi-stage loaders with in-memory execution, this campaign demonstrates how modern malware can bypass traditional defenses and maintain persistent control over infected systems.

Organizations must move beyond basic antivirus protections and adopt behavior-based detection, strict access controls, and continuous monitoring to stay ahead.

CyberCory will continue tracking this campaign and similar threats as the global malware landscape continues to evolve.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img