In December 2022, the Cybereason Incident Response (IR) team investigated an incident that involved new deployment methods of GootLoader, observed recently in other cases.
The following observation was made regarding the infection methods used:
On top of the new techniques utilized to load GootLoader, the post-infection methods that the threat actor carried out stand out:
Gootkit / GootLoader
Gootkit initially started as a banking Trojan in 2014. It was only in 2021 when the actors behind this piece of malware moonlighted and switched from a banker Trojan to a malware loader, leading to the GootLoader name. Security firm Mandiant named the threat actor operating GootLoader “UNC2565”.
The Sophos researchers were the first to name this malware family Gootloader.
GootLoader generally relies on JavaScript for its infections. It also uses SEO poisoning techniques to place its infected pages in internet browser search results. That way, it will change how potential victims see them by presenting different websites whenever your link is clicked.
SEO Poisoning and malicious Google Ads explained with an example
SEO Poisoning and Google service abuse like Google Ads is becoming a trend amongst malware operators to distribute their payloads.
As explained above, threat actors create websites or populate web forums or similar websites with specific keywords and links, leading to a website hosting the infected file.
Search engine Ads are also leveraged to provide a link to the infected piece of malware (fake software for instance) on top of the search engine.
When searching for Rufus Pro, a USB boot disk creator tool, we provided an example on the search engine DuckDuckGo. The first result is the legitimate Rufus software page, and the second is the SEO Poisoning phishing domain.
This page seems to be taken down, but another related page is still up, https://ruflus[.]xyz. It appears to be a clone of the official Rufus page:
However the download links to a malicious payload:
Detection of SEO Poisoning and similar delivery methods such as Fake Google Ads We are fully aware of this ongoing trend as well as threats actors taking advantage of google ads to get initial access to their malware. As for now, all the threats and malware that are known to use these tactics (for example Redline, Vidar, IcedID, Gozi, Rhadamanthys and of course GootLoader) are covered in Cybereason. |
Relation with Wordpress-enabled websites
Most of the domains configured in the GootLoader PowerShell stage #2 script had one commonality : they displayed a “/xmlrpc.php '' relation in VirusTotal.
Intelligence teams have continuously observed GootLoader leveraging compromised Wordpress websites to use as C2 servers.
Post-infection Activities
Following the GootLoader infection, the Cybereason IR team observed hands-on keyboard activities which led to further deployment of attack frameworks, Cobalt Strike and SystemBC.
The threat actor leveraged these frameworks following the infection phase and during the lateral movement phase.
This blog post is a summary of a full 36-page Threat Alert, which can be downloaded here.
The Cybereason Defense Platform can detect and prevent GootLoader, Cobalt Strike, or SystemBC post-exploitations. Cybereason recommends the following actions:
Compromised machine cleansing: Isolate and re-image all infected machines, to limit the risk of a second compromise or the attacker still getting access to the network afterward.
Loïc Castel, IR Investigator, Cybereason IR Team
Loïc Castel is a Security Analyst with the Cybereason IR team. Loïc analyses and researches critical incidents and cybercriminals in order to better detect compromises. In his career, Loïc worked as a security auditor in well-known organizations such as ANSSI (French National Agency for the Security of Information Systems) and as Lead Digital Forensics & Incident Response at Atos. Loïc loves digital forensics and incident response but is also interested in offensive aspects such as vulnerability research.
Jakes Jansen, IR Investigator Cybereason IR Team
Jakes is an Incident Response consultant and has been with Cybereason for a total of 3 years specializing in IR, Reverse Engineering, and Threat Hunting. With more than 16 years of Infosec experience, Jakes was, among other roles, responsible for building and leading DFIR teams that have handled large-scale investigations for government and multinational private entities, including financial institutions, manufacturing, and telecommunications. Jakes also has experience in internal threat investigations, mobile phone analysis, syndicate cases, and data analysis expected with eDiscovery during corporate acquisitions.
Nitin Grover, IR Investigator, Cybereason IR Team
Cyber Security Specialist with over 5 years of multi-geographical experience in protecting organizations from various cyber security attacks. Reducing security risks by 70-80% for the clients by providing them with optimal Vulnerability Assessments, Detailed Log Analysis, Security Strategies, Risk Management Solutions, Credential Risk Assessments, SIEM Solutions that include continuous threat monitoring and malicious activity detection capabilities. Performing Incident Response Analysis and Digital Forensic investigations for clients on a security incident to ensure immediate containment, recovery, and no business disruption.