While surfing the web, we discovered a typosquatted website impersonating the official Telegram download portal that was actively distributing malware. The domain telegrgam[.]com hosts a malicious installer named tsetup-x64.6.exe, which appears to be a legitimate Telegram setup file.

Figure 1. Typosquatted website

However, further analysis revealed that it performs several malicious actions, including modifying Windows Defender settings, dropping staged payload files, and executing a malicious DLL loader.

The AutoRecoverDat.dll reads encoded payload data stored in XML files and reconstructs a PE payload at runtime. Instead of writing the payload to disk, it is loaded into memory using legitimate Windows utilities, helping the malware evade traditional file-based detection. Once executed, the malware establishes communication with its command-and-control (C2) server to receive updates from the attacker and maintain persistent communication with the infected system.

In this blog, we walk through the full analysis of this malware campaign from the fake Telegram installer and execution chain to payload delivery and C2 communication.

Initial Access – Fake Telegram Website

Figure 2. Infection Kill Chain

The infection chain begins with a typosquatted Telegram domain designed to trick users searching for Telegram downloads.

Example malicious domain:

hxxps[://telegrgam[.com

The website visually resembles the official Telegram download page and prompts users to download a Windows installer.

Downloaded file:

tsetup-x64.6.exe

Because users expect Telegram installers to use similar naming conventions as a regular setup executable, the malicious file appears legitimate.

Once executed, the installer initiates a multi-stage malware deployment process.

Execution Phase – Installer Behaviour

During installation, the executable launches several commands through cmd.exe, indicating suspicious behaviour.

Process Discovery

The installer executes the following command:

Figure 3. Process EnumerationFigure 3. Process Enumeration

This command enumerates running processes and searches for:

0tray.exe

This behaviour suggests the malware may be checking for previous infections or monitoring/security software.

Windows Defender Bypass

One of the first major malicious actions observed is the modification of Windows Defender exclusion rules.

The malware executes the following obfuscated command:

Figure 4. Defender Bypass

After removing obfuscation, the command resolves to:

powershell.exe -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath C:\,D:\,E:\,F:\

This command adds all the drive partitions in the system to Windows Defender exclusions. This significantly reduces the likelihood of detection and allows the malware to operate without antivirus scanning.

Registry Modification

The installer creates a registry entry used for identification.

Figure 5. Registry Artifact

This registry value likely serves as an infection marker, allowing the malware to determine if the system has already been infected.

This prevents redundant infections and may also be used by the malware during updates.

Payload Staging

The malware drops multiple files into the following directory:

C:\Users\<User>\AppData\Roaming\Embarcadero\

Files dropped include:

Figure 6. Payload Drop

Notably, the malware uses legitimate-looking file names to avoid suspicion.

The directory name Embarcadero is also commonly associated with legitimate development tools, which further reduces suspicion during manual inspection.

Fake Telegram Installation

The installer also drops a legitimate Telegram installer to maintain the illusion of legitimacy.

File dropped:

C:\Program Files (x86)\Applica\telegrom.exe

This executable appears to be a legitimate Telegram installer created with Inno-Setup.

This tactic is commonly used in malware campaigns to ensure that the user does not suspect malicious activity, since Telegram appears to install successfully.

Malicious DLL Execution

After dropping the payload files, the malware launches the following command:

Figure 7. DLL Execution

This executes the DLL using rundll32.exe, which is a legitimate Windows utility used to execute DLL exports.

However, the DLL is not a legitimate COM component, despite exposing the export:

DllRegisterServer

This export is used as an entry point for malicious code execution.

XML-Based Payload Storage

While reversing  the DLL, it was discovered that the payload is not directly stored in the DLL.

Instead, the DLL reads the following files:

GPUCache.xml

The XML file contains encoded binary data representing a portable executable (PE) payload. The malware performs the following actions:

  1. Reads XML file
  2. Extracts embedded binary data
  3. Reconstructs PE file
  4. Loads PE manually into memory

This technique is known as manual PE loading (reflective loading technique).

In-Memory Execution

Once the payload is reconstructed, it is loaded directly into memory.

Figure 8. Runtime Decryption

Instead of writing the PE to disk, the malware performs:

  • Memory allocation
  • PE mapping
  • Import resolution
  • Execution transfer

The payload executes inside rundll32.exe, which helps the malware blend in with legitimate system processes.

This behavior was confirmed using x32dbg, where the PE was observed being reconstructed and executed at runtime.

Command-and-Control Communication

After the payload is successfully loaded into memory, the malware initiates communication with its command-and-control infrastructure.

Figure 9.  Memory Execution

Observed network connection:

27[.50[.59[.77[:18852

Associated domain:

jiijua[.]com

The malware establishes a TCP connection to this server.

This communication allows the malware to:

  • Receive commands
  • Update payloads
  • Maintain persistent communication

C2 Communication

Once the malware establishes communication, it continues making repeated connections to the C2 server.

Figure 10. C2 Communication

This persistent connection likely supports:

  • Remote command execution
  • Data exfiltration
  • Payload updates
  • System monitoring

Such persistent communication is typical in remote access trojans and loaders.

Payload Update Mechanism

Network traffic analysis using Wireshark revealed that the malware downloads updated payload components from the C2 server.

Figure 11. C2 Payload Update

The update mechanism works as follows:

  1. Malware connects to C2 server
  2. Server delivers updated payload
  3. Payload is loaded at runtime
  4. Malware continues communication

This architecture allows attackers to dynamically update the malware without redistributing the original installer.

MITRE ATT&CK Mapping

The observed behaviour of the malware aligns with several tactics and techniques defined in the MITRE ATT&CK framework. Mapping malware activity to ATT&CK techniques helps security teams detect and mitigate similar threats.

ATT&CK TacticTechnique IDTechniqueObserved Behaviour
Initial AccessT1189Drive-by CompromiseMalware distributed through fake Telegram website
ExecutionT1059.003Command ShellMalware executes commands using cmd.exe
ExecutionT1059.001PowerShellPowerShell used to modify Defender settings
Defence EvasionT1562.001Disable Security ToolsWindows Defender exclusions added
Defence EvasionT1027Obfuscated/Compressed FilesPowerShell command obfuscation
PersistenceT1112Modify RegistryRegistry key HKCU\Microsoft User\Source created
Defence EvasionT1218.011Signed Binary Proxy ExecutionPayload executed via rundll32.exe
Defence EvasionT1620Reflective Code LoadingPE payload reconstructed from XML and loaded in memory
Command and ControlT1071Application Layer ProtocolTCP communication with remote server
Command and ControlT1105Ingress Tool TransferMalware downloads updated payload from C2

IOCs

MD5Detection Name
A9A5CC6B6766FEC51B281B94F5F17CCD (tsetup-x64.6.exe)Trojan(005cea261)
62F8EFFC7690455ABCB300E3574F0A93(Loaded Payload)Trojan(005d198a1)

Command and Control (C2)

  • 27.50.59.77:18852
  • jiijua.com

Typosquatted Domains

  • www.telegrgam.com
  • www.telefgram.com
  • www.tejlegram.com

This campaign demonstrates how attackers use typosquatted websites and social engineering to distribute malware disguised as legitimate software. In this case, a fake Telegram download delivers a multi-stage loader that bypasses security defenses, stages payload components, loads the malware into memory, and establishes communication with its command-and-control (C2) server.

Techniques such as Defender exclusion modification, reflective payload loading, and runtime updates allow the malware to evade traditional detection methods.

To mitigate such threats, users should download software only from official sources. Security solutions like K7 Antivirus, which offer malicious website blocking, can help prevent users from accessing harmful domains and stop malicious downloads before they reach the system.

Like what you're reading? Subscribe to our top stories.

If you want to subscribe to our monthly newsletter, please submit the form below.

    0 replies on “Fake Telegram Malware Campaign: Analysis of a Multi-Stage Loader Delivered via Typosquatted Websites”