GootLoader Malware Continues to be Active, Introducing New Versions for Enhanced Attacks

Jul 05, 2024NewsroomSEO Poisoning / Cyber Attack,

Threat actors are utilizing the GootLoader malware, which is still actively deployed to compromise hosts and transmit additional payloads.

GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks

Jul 05, 2024NewsroomSEO Poisoning / Cyber Attack,

GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks

Threat actors are utilizing the GootLoader malware, which is still actively deployed to compromise hosts and transmit additional payloads.

A recent analysis by Cybereason revealed that various versions of GootLoader, including GootLoader 3, are currently being utilized, showcasing the continual evolution of this malicious payload.

Despite changes in the specifics of GootLoader payloads over time, its infection tactics and overall functionality have remained consistent since its resurgence in 2020.

Cybersecurity

GootLoader, categorized as a malware loader associated with the Gootkit banking trojan, is connected to threat actor Hive0127 (aka UNC2565). This malware leverages JavaScript to download post-exploitation tools and is spread through search engine optimization (SEO) poisoning techniques.

Its primary purpose is to act as a conduit for delivering various malicious payloads like Cobalt Strike, Gootkit, IcedID, Kronos, REvil, and SystemBC.

GootLoader Malware

In recent developments, the operators behind GootLoader have introduced their own command-and-control (C2) and lateral movement tool called GootBot, expanding their reach to accommodate a broader audience for financial gains.

The attack process involves compromising websites to host the GootLoader JavaScript payload by disguising it as legal documents, such as contracts or agreements. Upon execution, this payload establishes persistence using a scheduled task and initiates additional JavaScript to trigger a PowerShell script for gathering system data and waiting for further directives.

Cybersecurity

According to security researchers Ralph Villanueva, Kotaro Ogino, and Gal Romano, websites hosting these archive files employ Search Engine Optimization (SEO) poisoning tactics to attract victims searching for business-related files like contract templates or legal documents.

These attacks are crafted to evade analysis and detection by utilizing techniques such as source code encoding, control flow obfuscation, and payload size inflation. Another tactic involves hiding the malware within legitimate JavaScript library files such as jQuery, Lodash, Maplace.js, and tui-chart.

“Throughout its lifecycle, GootLoader has undergone multiple updates, enhancing its evasion and execution functionalities,” the researchers stated.

Enjoyed this article? Stay tuned with us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.