ClipXDaemon Malware, a Stealthy Cryptocurrency Clipboard Hijacker on Linux
9 de Março de 2026, 05:07
![]()
ClipXDaemon: A Cryptocurrency-Focused Linux Threat
Unlike traditional Linux malware that depends on remote infrastructure, ClipXDaemon operates as a fully autonomous cryptocurrency clipboard hijacker. It contains no command-and-control (C2) functionality, performs no beaconing, and does not require instructions from remote servers. Instead, the malware monetizes victims directly. Once installed on a Linux system running an X11 graphical environment, ClipXDaemon monitors clipboard activity and replaces copied cryptocurrency wallet addresses with attacker-controlled ones in real time. If a victim pastes the altered address into a transaction field, funds are unknowingly transferred to the attacker. Researchers noted that the malware checks the runtime environment before execution. If it detects a Wayland session, where global clipboard scraping is restricted, the program terminates immediately.Links to ShadowHS Through a Shared Loader
The initial loader used in the campaign resembles one previously observed in ShadowHS malware samples. However, the similarity appears to stem from both threats using the same open-source bincrypter framework. [caption id="" align="aligncenter" width="1023"]Multi-Stage Infection Chain
The ClipXDaemon campaign uses a three-stage infection process:- Encrypted Loader: A bincrypter-generated script containing an encrypted payload blob.
- Memory-Resident Dropper: Decrypted in memory using AES-256-CBC and gzip decompression.
- On-Disk ELF Payload: A clipboard-hijacking daemon written to disk.
Persistence and Installation
The decrypted dropper embeds a base64-encoded ELF binary, which it writes to the path: ~/.local/bin/<random_name> The filename is randomly generated between eight and nineteen characters with a numeric suffix. After writing the binary, the dropper marks it executable and launches it in the background. [caption id="" align="aligncenter" width="502"]Stealth Techniques and Process Masquerading
Once running, ClipXDaemon performs a double-fork daemonization sequence to detach from the controlling terminal. It creates a new session, closes standard file descriptors, and resets the file mode mask. The malware then calls prctl(PR_SET_NAME, …) to rename the process, disguising itself as a kernel worker thread. Specifically, it mimics the process name “kworker/0:2-events.” This technique is meant to reduce suspicion during casual inspection using tools like ps or top, as Linux administrators frequently encounter kernel worker processes and may overlook them.Clipboard Monitoring and Cryptocurrency Hijacking
After daemonization, ClipXDaemon connects to the X server using standard X11 APIs. If the connection fails, execution stops. Otherwise, the malware begins monitoring clipboard content every 200 milliseconds. [caption id="" align="aligncenter" width="610"]- Ethereum: ^0x[0-9a-fA-F]{40}$
- Bitcoin: ^(bc1|[13])[a-km-zA-HJ-NP-Z1-9]{25,34}$
- Monero: ^[4][0-9AB][1-9A-HJ-NP-Za-km-z]{93}$
- Dogecoin: ^D{1}[5-9A-HJ-NP-U]{1}[1-9A-HJ-NP-Za-km-z]{32}$
- Litecoin
- Tron
- Ripple (XRP)
- TON
- Ethereum: 0x502010513bf2d2B908A3C33DE5B65314831646e7
- Monero: 424bEKfpB6C9LkdfNmg61pMEnAitjde8YWFsCP1JXRYhfu4Tp5EdbUBjCYf9kRBYGzWoZqRYMhWfGAm1N5h6wSPg8bSrbB9
- Bitcoin: bc1qe8g2rgac5rssdf5jxcyytrs769359ltle3ekle
- Dogecoin: DTkSZNdtYDGndq1kRv5Z2SuTxJZ2Ddacjk
- Litecoin: ltc1q7d2d39ur47rz7mca4ajzam2ep74ccdwvqre6ej
- Tron: TBupDdRjUscZhsDWjSvuwdevnj8eBrE1ht
