HomeSample Page

Sample Page Title


Dec 09, 2023NewsroomMalware / Cyberattack

Anti-Analysis Techniques

Menace hunters have unmasked the most recent methods adopted by a malware pressure referred to as GuLoader in an effort to make evaluation tougher.

“Whereas GuLoader’s core performance hasn’t modified drastically over the previous few years, these fixed updates of their obfuscation strategies make analyzing GuLoader a time-consuming and resource-intensive course of,” Elastic Safety Labs researcher Daniel Stepanic stated in a report printed this week.

First noticed in late 2019, GuLoader (aka CloudEyE) is a sophisticated shellcode-based malware downloader that is used to distribute a variety of payloads, resembling info stealers, whereas incorporating a bevy of refined anti-analysis strategies to dodge conventional safety options.

A regular stream of open-source reporting into the malware in current months has revealed the menace actors behind it have continued to enhance its capability to bypass present or new security measures alongside different applied options.

GuLoader is usually unfold via phishing campaigns, the place victims are tricked into downloading and putting in the malware via emails bearing ZIP archives or hyperlinks containing a Visible Primary Script (VBScript) file.

UPCOMING WEBINAR

Cracking the Code: Study How Cyber Attackers Exploit Human Psychology

Ever puzzled why social engineering is so efficient? Dive deep into the psychology of cyber attackers in our upcoming webinar.

Be a part of Now

Israeli cybersecurity firm Verify Level, in September 2023, revealed that “GuLoader is now offered beneath a brand new title on the identical platform as Remcos and is implicitly promoted as a crypter that makes its payload totally undetectable by antiviruses.”

One of many current modifications to the malware is an enchancment of an anti-analysis method first disclosed by CrowdStroke in December 2022 and which is centered round its Vectored Exception Dealing with (VEH) functionality.

It is price declaring that the mechanism was beforehand detailed by each McAfee Labs and Verify Level in Might 2023, with the previous stating that “GuLoader employs the VEH primarily for obfuscating the execution stream and to decelerate the evaluation.”

The tactic “consists of breaking the conventional stream of code execution by intentionally throwing a lot of exceptions and dealing with them in a vector exception handler that transfers management to a dynamically calculated tackle,” Verify Level stated.

GuLoader is way from the one malware household to have acquired fixed updates. One other notable instance is DarkGate, a distant entry trojan (RAT) that allows attackers to totally compromise sufferer methods.

Offered as malware-as-a-service (MaaS) by an actor referred to as RastaFarEye on underground boards for a month-to-month payment of $15,000, the malware makes use of phishing emails containing hyperlinks to distribute the preliminary an infection vector: a VBScript or Microsoft Software program Installer (MSI) file.

Trellix, which analyzed the most recent model of DarkGate (5.0.19), stated it “introduces a brand new execution chain utilizing DLL side-loading and enhanced shellcodes and loaders.” Additional, it comes with an entire rework of the RDP password theft characteristic.

Anti-Analysis Techniques
(Supply: Trellix) Overview of the DarkGate v5 multistage set up chain

“The menace actor has been actively monitoring menace reviews to carry out fast modifications thus evading detections,” safety researchers Ernesto Fernández Provecho, Pham Duy Phuc, Ciana Driscoll, and Vinoo Thomas stated.

“Its adaptability, the velocity with which it iterates, and the depth of its evasion strategies attest to the sophistication of recent malware threats.”

Cybersecurity

The event comes as distant entry trojans like Agent Tesla and AsyncRAT have been noticed being propagated utilizing novel email-based an infection chains that leverage steganography and unusual file varieties in an try to bypass antivirus detection measures.

It additionally follows a report from the HUMAN Satori Menace Intelligence Staff about how an up to date model of a malware obfuscation engine referred to as ScrubCrypt (aka BatCloak) is getting used to ship the RedLine stealer malware.

“The brand new ScrubCrypt construct was offered to menace actors on a small handful of darkish net marketplaces, together with Nulled Discussion board, Cracked Discussion board, and Hack Boards,” the corporate stated.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles