Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CERT-UA uses LLM for Phishing Campaigns to discover Lamehug Malware linked to APT28

A critical nvidia container toolkit flaw allows privilege escalation in AI cloud services

Hypersonic Flight’s new ESA test platform

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cybercriminal deploys Xloader malware via ZIP archives using EclipseJarsigner
Identity

Cybercriminal deploys Xloader malware via ZIP archives using EclipseJarsigner

userBy userFebruary 20, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 20, 2025Ravi LakshmananCybercrime/Malware

Malware via ZIP Archives

Malware campaigns that distribute Xloader malware have been observed using DLL sideloading techniques by using legitimate applications related to Eclipse Foundation.

“Jarsigner, the legal application used in attacks, is a file created during the installation of IDE packages distributed by the Eclipse Foundation,” says Ahnlab Security Intelligence Center (ASEC). “It’s a tool for signing JAR (Java Archive) files.”

The Korean cybersecurity company said the malware is being propagated in the form of a compressed ZIP archive containing side-loaded DLLs to launch the malware.

Cybersecurity

document2012.exe, the renamed version of the legitimate jarsigner.exe binary jli.dll, the dll file modified by the threat actor, has been modified to decrypt and inject concrt140e.dll.

When “documents2012.exe” is executed, the attack chain will run over a malicious phase and trigger the execution of the “jli.dll” library that has been tampered with to load the xloader malware.

“The distributed CONCRT140E.DLL file is an encrypted payload that is decrypted during the attack process and injected into the legitimate file ASPNET_WP.EXE for execution,” ASEC said.

“Injected malware, Xloader, steals sensitive information such as user PC and browser information, and performs various activities such as downloading additional malware.”

Xloader, the successor to the Formbook malware, was first detected in Wild in 2020. It is sold to other criminals under the Malware as a Service (MAAS) model. In August 2023, it was discovered that MacOS versions of Information Stealer and KeyLogger were impersonating Microsoft Office.

“Xloader versions 6 and 7 include additional obfuscation and encryption layers to protect critical code and information to beat signature-based detection and complicate reverse engineering efforts. “We’ll be doing that,” Zscaler Threatlabz ​​said in a two-part report released this month.

Malware via ZIP Archives

“Xloader introduced previously observed techniques in the smoke loader, which encrypts some of the code at runtime and includes NTDLL hook avoidance.”

Further analysis of the malware revealed that hard-coded decoil lists were used to reveal the blending of actual command and control (C2) network communications with traffic to legitimate websites. Both the decoy and the actual C2 server are encrypted using different keys and algorithms.

As with malware families like Pushdo, the intent behind using decoys is to generate network traffic in legitimate domains to hide actual C2 traffic.

Cybersecurity

DLL sideloading has also been abused by the threat of Smartapesg (aka ZPHP or Haneymaney) and provides net support rats through legal websites compromised with JavaScript Web Injection, and remote access trojans can be used to STEALC It acts as a conduit to drop theft.

This development will be used by Zscaler to provide detailed explanations of two other malware loaders named Nodeloader and Riseloader, and to distribute a wide range of information stolen goods, cryptocurrency miners, and botnet malware such as Vidar, Lumma, Phemedrone, Xmrig, Socks5Systemz. is used in.

“Riseloader and Risepro share some similarities in network communication protocols, including message structure, initialization process, and payload structure,” he said. “These duplications may indicate that the same threat actors are behind both malware families.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOPUS Agency acquires the company we hold
Next Article PCI DSS 4.0 requires DMARC by March 31, 2025
user
  • Website

Related Posts

A critical nvidia container toolkit flaw allows privilege escalation in AI cloud services

July 18, 2025

CERT-UA uses LLM for Phishing Campaigns to discover Lamehug Malware linked to APT28

July 18, 2025

Why IT Leaders Should Rethink Backups in the Age of Ransomware

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CERT-UA uses LLM for Phishing Campaigns to discover Lamehug Malware linked to APT28

A critical nvidia container toolkit flaw allows privilege escalation in AI cloud services

Hypersonic Flight’s new ESA test platform

Why IT Leaders Should Rethink Backups in the Age of Ransomware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.