MintsLoader Malware Analysis: Multi-Stage Loader Used in Cyber Attacks

April 29, 2025, 9:53 p.m.

Description

MintsLoader, a malicious loader first observed in 2024, is employed in phishing and drive-by download campaigns to deploy payloads like GhostWeaver, StealC, and modified BOINC clients. It uses obfuscated JavaScript and PowerShell scripts in a multi-stage infection chain, featuring sandbox evasion techniques, a domain generation algorithm, and HTTP-based C2 communications. Various threat groups, including TAG-124 and SocGholish operators, utilize MintsLoader to target industrial, legal, and energy sectors. The loader's sophisticated obfuscation and evasion methods complicate detection, but Recorded Future's Malware Intelligence Hunting provides up-to-date information on new samples and C2 domains.

Date

  • Created: April 29, 2025, 6:01 p.m.
  • Published: April 29, 2025, 6:01 p.m.
  • Modified: April 29, 2025, 9:53 p.m.

Attack Patterns

  • GhostWeaver
  • MintsLoader
  • StealC
  • AsyncRAT
  • TAG-124

Additional Informations

  • Energy
  • Legal
  • Manufacturing
  • Italy