Back to reports
highPhishing

CryptoVista Trojanized Installer: Stolen Docaposte EV Certificate Achieves 0/36 AV Detection While Impersonating Legitimate Crypto Brand

PublishedMarch 12, 2026
Threat Actors:Assessment for Certificate
phishingsocial-engineeringc2

TL;DR: A trojanized cryptocurrency application installer is abusing a freshly issued SSL.com Extended Validation code signing certificate stolen from TRUST & SIGN POLAND, a subsidiary of French postal giant Docaposte (La Poste Group). The certificate was issued on March 4, 2026 -- one day before the malware appeared in the wild -- and achieves 0/36 AV detection on ReversingLabs. The Inno Setup 6.7.0 installer uses ChaCha20 encryption with PBKDF2 key derivation to hide its payload, performs process injection via WriteProcessMemory, and implements geofencing via system language discovery. The malware impersonates CryptoVista, a legitimate cryptocurrency news site established in 2014, complete with a professionally written privacy policy designed to disarm suspicious users. As of this writing, the abused certificate is not listed on the MalwareBazaar Code Signing Certificate Blocklist.


A Certificate Issued Monday, Weaponized by Tuesday

The timeline tells the story. On March 4, 2026, SSL.com issued an Extended Validation code signing certificate to TRUST & SIGN POLAND SP Z O O -- a real Polish company, KRS-registered, owned by Docaposte, itself a subsidiary of France's La Poste Group. By March 5, a malware sample signed with that certificate appeared on ReversingLabs. By March 9, it hit MalwareBazaar. At no point did any of the 36 antivirus engines on ReversingLabs flag it.

This is EV certificate abuse at its most effective: a signed, legitimate-appearing binary from a real company in the digital trust business, burning through every security control that relies on code signing as a trust signal.

The certificate thumbprint 79207f8316533991fb54281cf8cacf777038dc189c97e83cf49fa4551206776c is not on the CSCB as of March 10, 2026. The abused certificate is still technically valid.

The Attack Chain

[Social Engineering]     [Delivery]          [Installation]        [Execution]           [Actions]
Brand impersonation  ->  Signed EXE      ->  Inno Setup      ->  WriteProcessMemory -> [Encrypted Payload]
CryptoVista brand        EV cert bypass       ChaCha20 decrypt     Process injection     Stealer/RAT (TBD)
Privacy policy           0/36 AV detect       Drop .tmp (4.2MB)    Language check        Sandbox evasion
                                              Geofence check

The operator constructed a credible social engineering package: a signed installer impersonating a real cryptocurrency brand, bundled with a professional privacy policy that explicitly states "We do not ask for private keys, seed phrases or PINs." The irony is deliberate -- the privacy policy is itself the social engineering, designed to make crypto-savvy users feel safe by addressing exactly the concerns they would have.

Code Signing Certificate Analysis

The Full Chain

LevelSubjectValid FromValid ToSerial
Root CASSL.com EV Root CA RSA R22017-05-312042-05-3056b629cd34bc78f6
IntermediateSSL.com EV Code Signing Intermediate CA RSA R32019-03-262034-03-22424b6a53cec766141c2a63b1a51c4104
End-entityTRUST & SIGN POLAND SP Z O O2026-03-042026-08-22084df03cc7d8caf34c5c2cfeec448b27

Key details on the signing certificate:

  • Thumbprint (SHA256): 79207f8316533991fb54281cf8cacf777038dc189c97e83cf49fa4551206776c
  • Key Size: RSA 3072-bit
  • Extended Key Usage: Code Signing
  • Certificate Policies: OID 2.23.140.1.3 (EV Code Signing)
  • CSCB Status: NOT LISTED

Who Is TRUST & SIGN POLAND?

This is not a shell company. TRUST & SIGN POLAND SP Z O O is a legitimate business entity registered in the Polish KRS (National Court Register):

FieldValue
KRS Number0000936459
NIP (Tax ID)7252314776
REGON52065462100000
RegisteredDecember 9, 2021
Addressul. Ogrodowa 8, lokal VI P., 91-062 Lodz, Poland
OwnerDOCAPOSTE TRUST & SIGN (French SAS, 100% Docaposte subsidiary)
Previous OwnerIDEMIA POLAND R&D SP Z O O
BusinessDigital trust services, software publishing, IT consulting

One detail stands out in the registry data: wzmiankaOBrakuPokryciaKapitalu: True -- a notation that the company's capital is not fully covered. While not definitive, financial stress at a digital trust company is a relevant signal when assessing how a private key might have been compromised.

How Did the Operator Get This Certificate?

Three hypotheses, ordered by probability:

  1. Stolen private key (HIGH confidence): The key was exfiltrated from TRUST & SIGN POLAND's infrastructure. A company in the digital trust and code signing business is a high-value target -- compromising one entity yields signing capabilities that can be reused across campaigns.
  2. Fraudulent EV issuance (MEDIUM confidence): Someone impersonated the company through SSL.com's EV validation process. The one-day turnaround from certificate issuance to malware appearance suggests a pre-planned operation with the signing infrastructure ready before the certificate existed.
  3. Insider abuse (LOW confidence): Less likely given the company is wholly owned by a major French corporation with enterprise governance structures.

Malware Technical Analysis

Sample Details

FieldValue
SHA25687c266e14685da69531d6e6fd8128c8727a4e28cdc372a6b84718d85c804c705
SHA15d753f117d68283b967f7cc1068293265cb2509a
MD5164d7f11406aeaeea2b814a700176a98
Imphash88016fcdef7f227c62171d0afad9aae4
Size2,094,616 bytes (2.1 MB)
TypePE32 executable (GUI) Intel 80386
CompilerDelphi (Embarcadero RAD Studio)
FrameworkInno Setup 6.7.0
Compilation2026-01-02T11:55:47Z
First Seen (RL)2026-03-05T19:00:36Z
First Seen (MB)2026-03-09T21:32:53Z

Layered Encryption Architecture

The installer uses a serious encryption stack designed to prevent static payload extraction:

  1. PBKDF2 -- Key derivation from an embedded installer password
  2. SHA256 -- Hash function within key derivation
  3. ChaCha20 -- Symmetric encryption of the installer's data payload
  4. XOR -- Additional obfuscation layer (RandomXorStartOffset, RandomXorFirstSlice)
  5. LZMA1 Small -- Compression of the encrypted data

The encryption parameters are stored in the Inno Setup header:

  • TSetupEncryptionKey (32 bytes)
  • TSetupEncryptionNonce (24 bytes)
  • EncryptionBaseNonce
  • CryptKey

This is not the default Inno Setup encryption. The operator specifically configured ChaCha20 with PBKDF2 key derivation -- a deliberate choice to make automated unpacking tools fail.

Inno Setup Structure

ComponentOffsetSizeContent
Setup Loader (PE)0x0~0xd0400Delphi Inno Setup loader engine
Setup Messages (zlb)0xd0400~0x4177PNG icon + RTF Privacy Policy
Setup Header (encrypted)0xd4577~0x2BA61ChaCha20-encrypted header + file data
Authenticode Signature0x1fcfd89,792PKCS#7 code signing signature

PE Section Table

SectionVirtual SizeRaw SizeEntropyNotes
.text0xaf7fc0xaf8006.39Main code
.itext0x18cc0x1a006.04Delphi initialization
.data0x3f3c0x40005.18Initialized data
.bss0x734c0x00.00Uninitialized data
.idata0x10680x12004.82Import table
.reloc0x11fec0x120006.70Relocations
.rsrc0x74c80x76006.68Resources

Note the entropy values: .text at 6.39 and .rsrc at 6.68 are elevated but not high enough to trigger packer detection heuristics. The encrypted payload lives in the Inno Setup data stream, not in the PE sections themselves -- another deliberate evasion choice.

Behavioral Analysis

Sandbox analysis across Windows 10 and Windows 11 environments (Triage) revealed the malware's execution pattern and its evasion behavior.

Process Tree

CryptoVista_Installer_fSRqK__2_.exe (PID 1364/3796)
  -> is-XXXXXX.tmp\CryptoVista_Installer_fSRqK__2_.tmp (PID 4492/3372)
     [WriteProcessMemory injection from parent to child]

The parent process spawns a child via the Inno Setup temporary extraction, then uses WriteProcessMemory to inject code into the child process. This is consistent with process hollowing or direct code injection -- the child process serves as a clean vessel for the actual malicious payload.

Dropped Files

FileSHA256Size
CryptoVista_Installer_fSRqK__2_.tmpf8892860c6c5446d477daadd343e680caeac7bd0e4f04ff5fc6bec11593539344.2 MB

The dropped .tmp file at 4.2 MB is significantly larger than the 2.1 MB installer, suggesting the encrypted payload expands considerably after decryption.

Network Activity

DestinationPortProtocolPurpose
8.8.8.853UDPDNS resolution
172.217.208.94 (c.pki.goog)80HTTPGoogle CRL check
52.111.229.48--TCPMicrosoft infrastructure

The network profile is notable for what it does not contain: no C2 communication, no data exfiltration, no payload download. The malware detected the sandbox and refused to execute its full payload. The only outbound traffic is benign system activity -- DNS resolution, CRL checks, and a Microsoft telemetry endpoint.

Geofencing via Language Discovery

Registry access: HKLM\SYSTEM\ControlSet001\Control\NLS\Language

The malware queries the system language configuration before proceeding. This is MITRE T1614.001 (System Location Discovery: System Language Discovery) -- a common technique used by Eastern European cybercrime operations to avoid executing in CIS countries, or to target specific language regions for maximum impact.

The Social Engineering Package

The installer includes a professionally crafted RTF privacy policy that would pass casual inspection. Key excerpts from the policy text:

  • References "CryptoVista Inc." as the publisher
  • Claims to collect only "technical data" and "crash logs"
  • Explicitly states: "We do not ask for private keys, seed phrases or PINs"
  • Provides contact email: info@cryptovista[.]com
  • Mentions "Changers listed in the app" (cryptocurrency exchange references)
  • Includes standard GDPR-style privacy language

This is high-effort social engineering. By proactively addressing cryptocurrency security concerns, the operator targets exactly the audience most likely to scrutinize an installer -- and disarms them with the privacy assurances they expect from a legitimate crypto application.

Brand Impersonation: The Real CryptoVista

The legitimate cryptovista[.]com is a real entity, and the impersonation is deliberate:

FieldValue
Domaincryptovista[.]com
IP64.23.237.22 (DigitalOcean)
HostingCloudways (WordPress)
NameserversCloudflare (elsa.ns, ned.ns)
EmailMicrosoft 365 (verified tenant MS=ms55869585)
RegistrarGoDaddy
Created2014-04-29
ContentCryptocurrency news articles (2021-2022 era)
StatusActive but unmaintained since late 2022

The real CryptoVista is a cryptocurrency news website -- it does not offer downloadable software, wallets, or tools. The malware's claim to be "CryptoVista" application software is entirely fabricated. The operator likely selected this brand because it has recognizable domain age and crypto-sector relevance but appears abandoned, making it unlikely to issue public takedown notices or warnings.

MITRE ATT&CK Mapping

TacticTechniqueIDImplementation
Resource DevelopmentCode Signing CertificatesT1588.003Abused EV cert from TRUST & SIGN POLAND via SSL.com
Resource DevelopmentEstablish AccountsT1585Impersonation of CryptoVista brand
Initial AccessDrive-by Compromise / PhishingT1189/T1566Trojanized installer distribution (vector TBD)
ExecutionUser Execution: Malicious FileT1204.002Victim runs signed installer
Defense EvasionSubvert Trust Controls: Code SigningT1553.002EV code signing bypasses SmartScreen and AV
Defense EvasionObfuscated Files or InformationT1027ChaCha20 + PBKDF2 + XOR encryption layers
Defense EvasionProcess InjectionT1055WriteProcessMemory from parent to child process
Defense EvasionVirtualization/Sandbox EvasionT1497Minimal activity in sandbox environments
DiscoverySystem Location Discovery: System LanguageT1614.001NLS\Language registry check for geofencing
DiscoverySystem Information DiscoveryT1082OS version and language enumeration

Indicators of Compromise

File Indicators

# Main installer
87c266e14685da69531d6e6fd8128c8727a4e28cdc372a6b84718d85c804c705  (SHA256)
5d753f117d68283b967f7cc1068293265cb2509a                          (SHA1)
164d7f11406aeaeea2b814a700176a98                                  (MD5)

# Dropped temporary file
f8892860c6c5446d477daadd343e680caeac7bd0e4f04ff5fc6bec1159353934  (SHA256)

# UnpacMe extracted payload
dd02afed5a797cb01fb64f5f484b6c9b52479de72043f0b0b1b422b39b954d56  (SHA256)

# Import hash (generic Inno Setup 6.7.0)
88016fcdef7f227c62171d0afad9aae4  (Imphash)

Certificate Indicators

# Abused EV certificate -- block on sight
Thumbprint: 79207f8316533991fb54281cf8cacf777038dc189c97e83cf49fa4551206776c
Serial:     084df03cc7d8caf34c5c2cfeec448b27
Subject:    TRUST & SIGN POLAND SP Z O O
Issuer:     SSL.com EV Code Signing Intermediate CA RSA R3

Behavioral Indicators

# Filename patterns
CryptoVista_Installer_*.exe
is-*.tmp\CryptoVista_Installer_*.tmp

# Registry access
HKLM\SYSTEM\ControlSet001\Control\NLS\Language

# Process behavior
Parent -> child WriteProcessMemory injection

Network (Impersonated -- NOT malicious infrastructure)

# These are LEGITIMATE and should NOT be blocked
cryptovista[.]com        (impersonated brand)
info@cryptovista[.]com   (referenced in fake privacy policy)

Detection Opportunities

YARA Rules

rule CryptoVista_Trojanized_Installer {
    meta:
        description = "Detects CryptoVista trojanized Inno Setup installer with ChaCha20 encryption"
        author = "Breakglass Intelligence"
        date = "2026-03-10"
        tlp = "TLP:CLEAR"
        severity = "HIGH"
        hash = "87c266e14685da69531d6e6fd8128c8727a4e28cdc372a6b84718d85c804c705"
        reference = "https://intel.breakglass.tech"
    strings:
        $inno = "Inno Setup" ascii
        $brand1 = "CryptoVista" ascii wide nocase
        $brand2 = "CryptoVista Inc" ascii wide nocase
        $privacy = "private keys, seed phrases" ascii wide nocase
        $delphi_export = "__dbk_fcall_wrapper" ascii
        $chacha = "ChaCha20" ascii wide
    condition:
        uint16(0) == 0x5A4D and
        $inno and $delphi_export and
        (2 of ($brand*) or $privacy or $chacha)
}

rule EV_Cert_TrustSignPoland_Abuse {
    meta:
        description = "Detects binaries signed with abused TRUST & SIGN POLAND EV certificate"
        author = "Breakglass Intelligence"
        date = "2026-03-10"
        tlp = "TLP:CLEAR"
        severity = "CRITICAL"
    strings:
        $subject = "TRUST & SIGN POLAND" ascii wide
        $serial = { 08 4d f0 3c c7 d8 ca f3 4c 5c 2c fe ec 44 8b 27 }
        $issuer = "SSL.com EV Code Signing" ascii wide
    condition:
        uint16(0) == 0x5A4D and
        ($subject and $issuer) or $serial
}

Sigma Rule -- Process Injection from Inno Setup Installer

title: CryptoVista Installer Process Injection
id: a3f8c9d1-7e2b-4c5a-b6d0-9e1f3a8c7d2e
status: experimental
description: Detects WriteProcessMemory injection pattern from Inno Setup installer processes
author: Breakglass Intelligence
date: 2026/03/10
logsource:
    category: process_access
    product: windows
detection:
    selection:
        SourceImage|endswith:
            - 'CryptoVista_Installer*.exe'
        GrantedAccess|contains:
            - '0x20'   # PROCESS_VM_WRITE
            - '0x8'    # PROCESS_VM_OPERATION
    condition: selection
level: high
tags:
    - attack.defense_evasion
    - attack.t1055

Endpoint Detection Queries

# KQL -- Microsoft Defender for Endpoint
DeviceProcessEvents
| where FileName matches regex @"CryptoVista_Installer.*\.exe"
| join kind=inner (
    DeviceProcessEvents
    | where ActionType == "WriteProcessMemory"
) on DeviceId, InitiatingProcessId
| project Timestamp, DeviceName, FileName, ProcessCommandLine

# KQL -- Language discovery after Inno Setup execution
DeviceRegistryEvents
| where RegistryKey has "Control\\NLS\\Language"
| where InitiatingProcessFileName matches regex @"is-.*\.tmp"
| project Timestamp, DeviceName, InitiatingProcessFileName, RegistryKey

Certificate-Based Blocking

For organizations that can enforce certificate-based policies:

# Windows WDAC policy addition
# Block the abused certificate by its TBS hash
Add-WDACPolicy -CertificateThumbprint "79207f8316533991fb54281cf8cacf777038dc189c97e83cf49fa4551206776c" -Action Block

# Carbon Black -- block by signer
process_name:*.exe AND digsig_subject:"TRUST & SIGN POLAND SP Z O O"

What We Still Do Not Know

The encrypted payload prevented full detonation in sandboxed environments. Several critical questions remain:

  1. What is the final payload? The behavioral indicators (process injection, geofencing, sandbox evasion) are consistent with an info-stealer or RAT, but the actual payload family is unconfirmed.
  2. What is the delivery vector? The installer exists, but we have not yet identified how victims encounter it -- likely candidates include fake download pages, SEO poisoning targeting crypto keywords, or targeted phishing.
  3. Are there additional samples? The certificate was issued March 4. Only one sample has appeared. An EV certificate this fresh is a high-value asset -- the operator almost certainly plans to sign additional payloads.
  4. Was the company infrastructure compromised? TRUST & SIGN POLAND is in the digital trust business. If their signing infrastructure was breached, the implications extend well beyond this single malware sample.

Non-sandboxed dynamic analysis is required to obtain the full payload behavior and confirm the malware family.


Published by Breakglass Intelligence. Investigation conducted 2026-03-09. 0/36 AV detection. EV certificate not blocklisted. Abuse reports filed. Classification: TLP:CLEAR

Share