Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New forklifts for malicious programs use fake call stack, GitHub C2 and .Net Reactor for Stealth
Global Security

New forklifts for malicious programs use fake call stack, GitHub C2 and .Net Reactor for Stealth

AdminBy AdminApril 2, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


02 April 2025Red LakshmananDetection of threat / malicious software

Cybersecurity researchers have discovered the updated version of the forklifts called Hijack Loader, which implements new features to eliminate and establish persistence on impaired systems.

“The bypassing forces released a new module that implements the fake stack caused to hide the origin of functional calls (eg – Note In the analysis. “The bypass loader added a new module to check VM to detect malware analysis and sandbox.”

The forklift, which was first discovered in 2023, offers the opportunity to deliver useful load in the second stage, such as the information malicious program. It also comes with different modules to bypass the safety and imposition of malicious code. The tracking for the tracking is monitored by a wide community of cybersecurity called Doiloader, GhostPulse, IDAT LOADER and Shadowladder.

In October 2024 Harfanglab and Elastic Security Labs minute Loaders that used legitimate code signing certificates, as well as a boring ClickFix strategy to distribute malware.

Cybersecurity

Last Iceration Items comes with a number of improvements compared to the previous Coffeeode.

“This technique uses a chain of EBP pointers to overcome the stack and hide the malicious call in the stack, replacing the actual stack frame with fabricated,” Zscaler said.

As in the previous versions, the abduction loader uses Technique To perform 64-bit straight Syscalls for the injection process. Other changes include revision into the list list that includes “Avastsvc.exe”, Avast Antivirus Antivirus component to delay the performance for five seconds.

Malicious software also includes two new modules, namely Antivm to detect virtual machines and Modtask to create perseverance through the planned tasks.

The resulting data shows that the abduction loader continues to be actively supported by operators in order to complicate the analysis and detection.

Shelby Malware uses GitHub for teams and control

Development occurs when elastic safety laboratories have talked about the new family of malware, called Shelby, which uses GitHub for teams and control (C2), data exports and remote control. Activities are monitored as Ref8685.

The attack network involves the use of phishing email as a starting point for the ZIP archive distribution that contains binary .Net used to perform the DLL loader, tracked as Shelbloader (“httpservice.dll”) by downloading dll. E-mail messages were delivered to a telecommunications firm based in Iraq through highly targeted phishing electronic mail sent from the target organization.

After that, the forklift initiates a connection with GitHub for C2 to obtain a specific 48-bite value from the file called “Lixing.txt” in the storage controlled by the attackers. Then the value is used to create the AES transcript key and decipher the main useful load load (“httpapi.dll”) and load it in memory without leaving the discovered artifacts on the disk.

“Shelbyloader uses sandbox detection methods to identify a virtual or monitoring environment,” elastic – Note. “After execution, he sends the results back to C2. These results are packaged in magazine files, telling in detail whether each detection method has been successfully determined by the Sandbox.”

Cybersecurity

For its part of the Shelbyc2 Backdoor, listed in another file called “Command.txt” to download/download files from/to GitHub repository, download binary binary .Net and run PowerShell commands. It is noteworthy that the C2 connection occurs through commitments in a private repository using a personal access sign (PAT).

“The way malicious software means that anyone who has a Pat (personal access token) can theoretically get teams sent to the attackers and conclusions of teams from any victim’s car,” the company said. “This is because the PAT token is built into binary and can use anyone who receives it.”

Emmenhtal distributes sumkeloader through 7-ZIP files

Physhing-leaves that have baits with payment were also observed to deliver a family loading for loading. Emmenhtal Loader (aka peaklight) that acts as a pipe Diplomat.

“One of the notable techniques observed in this chimneys are the use of the .NET reactor. – Note.

“While the diplomat has historically used the packagingers such as the Dimida, Protector Enigma and Custom CryPters, the use of the reactor.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.