2022-05-04

Tricks from SocGholish and Zloader

Level: 
Tactical
  |  Source: 
Cybereason
Cybersecurity
Share:

Tricks from SocGholish and Zloader

In the latest report by Cybereason, tracking of malware activity from SocGholish and Zloader has detailed the malware's capabilities and infection tactics. SocGholish is named (partially) due to its social engineering tactics to lure victims with drive-by-downloads, often themed as critical browser updates. When clicked by the user, a payload is delivered as a compressed file and requires manual user execution to decompress the file, and trigger the execution of a malicious Javascript. Follow-up activity with SocGholish typically involves the deployment of Cobalt Strike and ransomware. Tracking by Cybereason identified an uptick in VirusTotal submissions for SocGholish, since December 2021. Two infection chains were observed by Cybereason, both heavily conducting reconnaissance to collect system information for data exfiltration. Zloader malware has typically been observed as an information stealer obtaining credentials, and sensitive data with backdoor capabilities to compromise a host further to deploy ransomware such as Egregor and Ryuk. Zloader's campaigns often involve masquerading as popular software to entice users to download a malicious MSI file. Following installation of the MSI file, bat scripts are executed to collect system information and disable defenses such as Windows Defender.

     

Get trending threats published weekly by the Anvilogic team.

Sign Up Now