Gootloader walkthrough
May 24, 2024, 8:55 a.m.
Description
The analysis delves into the intricate workings of the Gootloader malware campaign. Through a meticulously crafted social engineering scheme involving SEO poisoning and fake forums, threat actors lure unsuspecting victims into downloading a malicious JavaScript file disguised as a legitimate resource. This initial payload creates persistence via scheduled tasks, leading to further PowerShell execution and attempts to connect to malicious command and control servers, enabling data exfiltration and other nefarious actions.
Tags
Date
- Created: May 24, 2024, 8:29 a.m.
- Published: May 24, 2024, 8:29 a.m.
- Modified: May 24, 2024, 8:55 a.m.
Indicators
- f8f3fa45eced0c32fbbf912f3f8ba6100a8b59e14f12a125c88340a47cf7e57b
- a92381a403a1463b64ebc547de7ec2a4225a7755d23c4e56503582b9cb33c3c8
- 2efabb155d9d8fc56b5eb3dfdc83b3f3f9099a7c0bc87ff8f9b7550d587d5b35
- http://clintkustoms.com/manual.php
- virdo.ir
- shoreditchtownhall.com
- sachverstaendiger-fenster.net
- pureapks.xyz
- montebello6.se
- clintkustoms.com
- budgetvm.com
- ashleyhomeonline.com
Attack Patterns
- Gootloader
- T1053.005
- T1059.005
- T1059.003
- T1059.001
- T1059.007
- T1059.004
- T1547
- T1059