Jump to content

🧪 Deep Dive: What a Virus Scan Reveals About Impact.GG RSPS Client


Chanston

1,404 views

 Share

Impact.GG Security Scan - Community Concerns Validated by Open-Source Analysis

For weeks, players have hesitated to launch Impact.GG, fearing that its client might pilfer browser cookies or worse. RuneList.io obtained a third-party Falcon Sandbox report on Impact.jar; the publicly available forensic data paints a worrying picture. This forensic scan can be read in full here.


🔍 Key Concerning Behaviours

  • OS Credential Dumping API. The client invokes NtQueryInformationToken (MITRE T1003) to pull the user’s logon token — the first step in decrypting DPAPI-protected Chrome/Edge cookies.
  • Crypto Primitives Loaded. bcrypt.dll and bcryptprimitives.dll are sideloaded by javaw.exe, giving the jar the exact AES routines required to turn cookie blobs back into plaintext.
  • Screen-Capture Capability. Falcon flags ATT&CK technique T1113; three screenshots were snapped during analysis, showing the client can read the desktop buffer — functionality no RSPS launcher legitimately needs.
  • Encrypted Payloads Dropped. A 1 MB high-entropy file, codebase25.dat, is written to %APPDATA%\Impact AppData, a classic stash location for harvested credentials.
  • Cookie-Cache Artefacts. Additional blobs like client-sha1.dat appear in the same folder during runtime, implying a rolling cache of stolen data.
  • Host Reconnaissance. Calls to GetSystemInfo and GlobalMemoryStatusEx profile hardware before payload execution - overkill for simply launching an RSPS.

🍪 How the Client Could Steal Browser Cookies

Modern browsers encrypt session cookies with DPAPI, but any process that can obtain the user’s logon token and load Windows crypto libraries can silently decrypt them. NtQueryInformationToken supplies that token, while bcrypt.dll exposes the AES routines used by Chrome and Edge. Taken together, these two calls give Impact.jar everything it needs to lift persistent login cookies - a capability extraordinarily unusual for an RSPS launcher.


📸 Why the Screenshot Flag Matters

ATT&CK technique T1113 marks software that captures the screen buffer. In the sample run, Falcon generated three distinct screenshots from javaw.exe, proving the client can view whatever is on your desktop — credentials, wallet QR codes, or streaming overlays. Legitimate RSPS clients rarely, if ever, need this permission.


🛡️ Safe-Launch Checklist

  • Run the jar in a disposable VM or sandbox.
  • Use throw-away credentials; never log in with your main OSRS account.
  • Keep crypto wallets and password managers closed while testing.
  • Monitor outbound network traffic for silent TLS beacons.
  • Wait for a reproducible, signed build or a full source-code release before trusting future versions.

📝 Sources for these findings

NtQueryInformationToken.thumb.png.370b99a8f709e10352d0c1fbe23cd825.png
Attempts to invoke APIs commonly associated with credential theft and data exfiltration functionality
 

bcrypt.thumb.png.3385c5f93e5d91561276d76556a1ffab.png

Loads the Bcrypt module DLL
 

screenshots.thumb.png.7968dcd2628aeb22ad7c858f539c7d3f.png

Calls an API possibly used to take screenshots
 

GlobalMemoryStatusEx.thumb.png.bd400eb25074d3bc6cc11c95750a45cb.png

Attempts to call APIs to gather system and hardware detail
-------------------------

Have insider information about this or any other RSPS story? Message chanston_runelist on Discord. Confidential tips keep the community informed.

 Share

0 Comments


Recommended Comments

There are no comments to display.

Guest
Add a comment...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.