MassLogger Malware – Active IOCs
April 18, 2025ICS: Multiple Siemens TeleControl Server Vulnerabilities
April 18, 2025MassLogger Malware – Active IOCs
April 18, 2025ICS: Multiple Siemens TeleControl Server Vulnerabilities
April 18, 2025Severity
Medium
Analysis Summary
Since 2019, Guloader has been in operation as a downloader. GuLoader spreads through spam campaigns with malicious archived attachments. GuLoader downloads the bulk of malware, with the most frequent being AgentTesla, FormBook, and NanoCore. The encrypted payloads of this downloader are usually saved on Google Drive. It also acquired its payloads from Microsoft OneDrive and an attacker-controlled website.
GuLoader can avoid network-based detection by using genuine file-sharing websites, which aren't often filtered or inspected in corporate contexts. GuLoader malware spawns AgentTesla In its latest campaign in October 2022. AgentTesla is renowned for stealing data from a variety of target workstations' apps, including browsers, FTP clients, and file downloaders.
Guloader is often distributed as part of a wider malware campaign and is usually delivered in a packed or encrypted form to evade detection by security software. Once it has successfully installed itself on a system, it will attempt to establish persistence by modifying system settings, creating registry entries, and adding itself to startup items.
GuLoader has been actively deployed for over three years, and its developers continue to enhance its capabilities. The latest version incorporates advanced anti-analysis techniques, making it extremely challenging for security researchers to analyze and detect. The most recent GuLoader samples consistently receive zero detections on popular antivirus platforms like VirusTotal, ensuring the stealthy execution of its malicious payloads.
One notable feature of GuLoader is its fully encrypted payload, which includes the PE headers. This enables threat actors to store the payloads on well-known public cloud services, effectively evading traditional antivirus protections. By leveraging cloud storage, the malicious payloads can remain available for download over an extended period without raising suspicion.
While earlier versions of GuLoader were implemented as Visual Basic 6 (VB6) applications containing encrypted shellcode, the current variants predominantly utilize VBScript and NSIS installer-based techniques. The VBScript variant, in particular, stores the shellcode on a remote server, further complicating detection and analysis.
To protect against Guloader malware, it is important to have a strong antivirus solution in place and to keep all software up to date with the latest security patches. Additionally, users should be cautious when opening email attachments or clicking on links from unknown or suspicious sources.
Impact
- Malware Installation
- Detection Evasion
- Information Theft
Indicators of Compromise
MD5
35ba7f3f3b63098af026e06f9ab034f0
ed3fa130e3bf4f939c6adf12d60fc18d
0dd194af226bcf7dd82dff91590a3904
30f39cfe49af11f14c6ee920fdcfd78c
SHA-256
e181eec826635908de1ab0f9b512bc92eb22fe6995c3f07de2cd25d2caedbd4f
22c50e47775f4f5a48f4e659b369df347d36b2131c05c8c8dcf14936ce7d9406
79133ef39af68c50650c209ee94d2b34d118200a8b2e84465ab44c2ac8c39a60
7f2ebd49700ea7001b02a13970c52892313e04f377b0383e6911241db5c3c24b
SHA1
2c1fe1d9018bd974e6df83fefb2f43b649e52a58
580192a298ab766370f87cca7f1152bef7152d25
9edb5c8774f5d167b2a70aa9c0ed9de359f84eb8
1b98ae340d429d8c5114229056244e9b80c9898f
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Enforce access management policies.