Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Coffeeloader uses Packer based on GPU to avoid detection of EDR and antivirus detection
Global Security

Coffeeloader uses Packer based on GPU to avoid detection of EDR and antivirus detection

AdminBy AdminMarch 28, 2025No Comments3 Mins Read
Evade EDR and Antivirus Detection
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 28, 2025Red LakshmananIntelligence of security / threat final point

Evasion from detection of EDR and Antivirus

Cybersecurity researchers pay attention to a new complex malicious software called Coffeeode This is designed to download and perform secondary useful loads.

According to ZSCALER OPHERLABZ, shares the similarity of behavior with another known forklifts malicious programs known as Diplomat.

“The purpose of the malicious software-loading and perform useful load in the second stage, evading the detection of safety products based – Note In a technical record published this week.

“Malicious software uses numerous methods to bypass safety solutions, including a specialized package that uses GPU, reinforcement of the stack of calls, exacerbation of sleep and using Windows fibers.”

Cybersecurity

Coffeeloader, which emerged approximately in September 2024, uses the domain generation algorithm (DGA) as a backup mechanism in case the main team channels and control (C2) become unavailable.

Central for malicious software is a packer, which is called the code on the graphical processor of the system for complication of analysis under virtual conditions. It was called because it represents the legitimate A weapon box The usefulness developed by ASUS.

The sequence of infection begins with a dropper, which, among other things, tries to perform a useful DLL load, packed with weapons (“armouryaiosdk.dll” or “armourya.dll”) with high privileges, but not before trying to bypass the user account (UAC).

The drop is also intended to establish stability on the hosts using the planned assignment, which is set up to run either at the user entrance with the highest start -up or every 10 minutes. This step changes by the performance of the STAGER component, which in turn loads the main module.

“The main module implements numerous methods for eliminating antivirus (AV) and the detection and reactions of the final points (EDRS), including reinforcement of the stack of call. Sleep exacerbatedand use Windows of fibers-The Stone-Gros said.

These methods are able to forge Vocation of the package by obscures origin With the call of the function and the embarrassment of useful load when it is in a state of sleep, allowing it to reach the safety software system.

The ultimate goal of the Coffeeloader is to contact the C2 server via HTTPS to get malicious software in the next step. These include commands for introduction and execution Rhadamanthys Shellcode.

Cybersecurity

ZSCALER said he determined a number of common rhythms between the loader and the diplomatic source code, increasing the possibility that this could be the next basic iteration of the latter, especially in the following A., and after A. Efforts of law enforcement agencies Last year, which removed its infrastructure.

“There is also a noticeable similarity between the diplomatic and the cathedral, and the first spreads the second, but the exact connection between the two families is not clear yet,” the company said.

Development happens as a SEQRITE laboratory minute Phishing A snake key.

It also follows Another cluster of activity This is aimed at users engaged in cryptocurrency trading via Reddit Posts, advertising versions of Tradingview to cheat users to install thefts such as Lumma and Atomic in Windows and Macos Systems.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.