

SideWinder APT Group aka Rattlesnake – Active IOCs
July 8, 2024
Eldorado Ransomware Targets VMware ESXi and Windows – Active IOCs
July 8, 2024
SideWinder APT Group aka Rattlesnake – Active IOCs
July 8, 2024
Eldorado Ransomware Targets VMware ESXi and Windows – Active IOCs
July 8, 2024Severity
High
Analysis Summary
Threat actors are still using the malware ‘GootLoader’ to infect more computers and deliver additional payloads. Several versions of GootLoader have been created as a result of updates to the GootLoader payload with GootLoader 3 being presently in use.
“While some of the particulars of GootLoader payloads have changed over time, infection strategies and overall functionality remain similar to the malware's resurgence in 2020,” said the researchers.
GootLoader, a malware loader component of the Gootkit banking trojan, has been associated with Hive0127, also known as UNC2565. It is disseminated by search engine optimization (SEO) poisoning techniques and employs malicious JavaScript to download post-exploitation tools. Usually, it acts as a conduit for a variety of payloads, including REvil, IcedID, Kronos, Gootkit, Cobalt Strike, and SystemBC.

The threat actors behind GootLoader have also released a command-and-control (C2) and lateral movement tool called GootBot in recent months, suggesting that they are broadening their business to attract more attention to increase their profits. Attack chains use compromised websites to host the GootLoader JavaScript payload disguised as contracts and legal documents. When the payload is executed, it starts a PowerShell script that gathers system data and waits for instructions before establishing persistence through the use of a scheduled task.
These archive file hosts use SEO poisoning strategies to entice victims looking for business-related files, such as templates for contracts or legal papers. Notable aspects of the attacks include their use of payload size inflation, control flow obfuscation, and source code encoding to evade analysis and detection.
Another method involves infiltrating the malware into authentic JavaScript library files such as tui-chart, Lodash, jQuery, and Maplace.js. Throughout its life cycle, GootLoader has undergone several improvements, including modifications to its evasion and execution functionalities.
Impact
- Unauthorized Access
- Financial Loss
- Sensitive Data Theft
- Security Bypass
Remediation
- Never trust or open " links and attachments received from unknown sources/senders.
- Do not download documents attached to emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Regularly update all software and systems to ensure vulnerabilities are patched promptly.
- Implement robust email filtering to block phishing attempts that may deliver initial infection loaders.
- Utilize advanced endpoint detection and response (EDR) tools to identify and block suspicious activities.
- Conduct regular security audits and vulnerability assessments to identify and mitigate potential security gaps.
- Employ least privilege principles, ensuring users and applications have the minimum necessary access rights.
- Enable multi-factor authentication (MFA) to add a layer of security to user accounts.
- Monitor network traffic for unusual activities that could indicate the presence of malware or unauthorized access.
- Educate employees on recognizing phishing emails and safe online practices to reduce the risk of initial infection.
- Implement multi-factor authentication to add an extra layer of security to login processes.