A Modular Malware Loader, HijackLoader, Gaining Prominence in the World of Cybercrime

Home/BOTNET, Compromised, cyberattack, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update/A Modular Malware Loader, HijackLoader, Gaining Prominence in the World of Cybercrime

A Modular Malware Loader, HijackLoader, Gaining Prominence in the World of Cybercrime

“HijackLoader, a recently emerged malware loader, is rapidly gaining popularity within the cybercriminal community for distributing a range of payloads, which include DanaBot, SystemBC, and RedLine Stealer.”

More about HijackLoader

In July 2023, our company initially detected the HijackLoader Modular Malware Loader, a sophisticated threat that employs multiple evasion techniques.

These tactics encompass the utilization of syscalls to evade security solution detection, the monitoring of processes associated with security software using an internal block list, and the deliberate delay of code execution for up to 40 seconds at different stages.

Regrettably, the precise initial access vector employed to breach targets remains undisclosed. The loader incorporates a primary monitoring module that provides versatility for code input and execution through its integrated modules.

“HijackLoader is a modular loader with evasion techniques, offering multiple ways to load malicious payloads,” Pantazopoulos explained. “Additionally, it lacks advanced features and has low-quality code.”

The disclosure coincides with Flashpoint’s release of information regarding an enhanced version of malware called RisePro, which was formerly disseminated through a pay-per-install (PPI) malware download service called PrivateLoader.

Written in C++, RisePro is crafted to gather sensitive data from compromised systems and transmit it to a command-and-control (C&C) server as log files. It was initially made available for purchase in December 2022.

Additionally, a new Node.js-based information stealer, delivered through malicious ads on Facebook, fake websites mimicking ByteDance’s CapCut video editor, has been uncovered.

This marks the second instance of counterfeit CapCut websites being used as a conduit for malware distribution. In May 2023, Cyble detected two distinct attack chains that leveraged the software as bait to deceive unsuspecting users into executing Stealer Offx and Red Line Stealer.

“The Python-based malware employs Pyinstaller for packing, enabling the consolidation of all malicious code and its prerequisites into a single executable,” as stated by Cyfirma. “This information-stealing malware primarily targets Windows Defender, disabling it, altering its configurations, and establishing its own threat response protocols.”

“It further strives to minimize its detectability while securing a persistent presence on the compromised system. The malware demonstrates adeptness in data theft and exfiltration, effectively eluding security tools and dynamic analysis sandboxes.”

Indicators of Compromise (IOCs)

hxxps://www.4sync[.]com/web/directDownload/KFtZysVO/4jBKM7R0.baa89a7b43a7b73227f22ae561718f7fPayload URL, which HijackLoader uses to load Danabot.
hxxps://geupdate-service[.]bond/img/3344379399.pngPayload URL, which HijackLoader uses to load RedLine stealer.

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!