NodeLoader Exposed: The Node.js Malware Evading Detection
Dec. 16, 2024, 12:03 p.m.
Tags
External References
Description
Zscaler ThreatLabz discovered a malware campaign using Node.js applications for Windows to distribute cryptocurrency miners and information stealers. Named NodeLoader, this malware family employs Node.js compiled executables to deliver second-stage payloads like XMRig, Lumma, and Phemedrone Stealer. The attackers use social engineering, targeting gamers through YouTube and Discord, leading them to malicious websites resembling legitimate gaming platforms. NodeLoader uses the sudo-prompt module for privilege escalation and employs various evasion techniques. The malware downloads and executes PowerShell scripts, which in turn download and run additional payloads. The use of Node.js and large file sizes complicates detection for some security products, resulting in low antivirus detection rates.
Date
Published: Dec. 13, 2024, 10:59 p.m.
Created: Dec. 13, 2024, 10:59 p.m.
Modified: Dec. 16, 2024, 12:03 p.m.
Attack Patterns
Phemedrone Stealer
NodeLoader
Lumma Stealer
XMRig
T1562.002
T1543.003
T1059.001
T1562.001
T1204.002
T1041
Additional Informations
Gaming