• About
  • Privacy Policy
Open Security Labs
No Result
View All Result
No Result
View All Result
Open Security Labs
No Result
View All Result
Home Uncategorized

SquidLoader: A New Evasive Malware Targeting Chinese Organizations (0penBuckets)

Hriday Nakka by Hriday Nakka
23rd June 2024
in Uncategorized
0
SquidLoader
473
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter
  1. Introduction
  2. SquidLoader’s Deceptive Techniques
  3. Phishing Campaign Details
  4. Mechanism of SquidLoader
  5. Execution and Decoy Strategies
  6. Evasion Techniques
  7. Payload and Command & Control
  8. Conclusion

Introduction

LevelBlue Labs has recently uncovered a highly evasive loader, dubbed “SquidLoader,” which is being delivered to specific targets via phishing attachments. A loader is a type of malware designed to load second-stage payloads onto a victim’s system. The absence of previously observed samples in the wild prompted them to name this malware “SquidLoader,” emphasizing its adeptness at evasion and deception. Initial observations of SquidLoader date back to late April 2024, with indications that it had been active for at least a month prior.

SquidLoader’s Deceptive Techniques

SquidLoader exhibits several sophisticated techniques to avoid both static and dynamic analysis. In our sample, SquidLoader delivered a modified Cobalt Strike payload, known for its hardened resistance to static analysis. The configuration of SquidLoader suggests that the same unknown actor has been conducting sporadic campaigns over the past two years, predominantly targeting Chinese-speaking victims. This actor’s techniques and tactics may soon be replicated by other threat actors against non-Chinese speaking organizations.

Phishing Campaign Details

In late April 2024, researchers observed several executables attached to phishing emails. One such sample, named ‘914b1b3180e7ec1980d0bafe6fa36daade752bb26aec572399d2f59436eaa635,’ had a Chinese filename translating to “Huawei industrial-grade router related product introduction and excellent customer cases.” The samples were cleverly disguised with descriptive filenames aimed at luring employees of Chinese companies such as China Mobile Group Shaanxi Co Ltd, Jiaqi Intelligent Technology, and Yellow River Conservancy Technical Institute (YRCTI). Despite appearing as Word Document icons, these were executable binaries.

Mechanism of SquidLoader

The observed samples are loaders that download and execute shellcode payloads via GET HTTPS requests to the /flag.jpg URI. These loaders employ heavy evasion and decoy mechanisms, making them difficult to detect and analyze. The shellcode is loaded within the same loader process, avoiding the risk of being detected by not writing the payload to disk. Most samples were signed with a legitimate but expired certificate from Hangzhou Infogo Tech Co., Ltd. Additionally, the command and control (C&C) servers used a self-signed certificate, making it harder to trace the origin.

Execution and Decoy Strategies

Upon execution, SquidLoader duplicates itself to a predefined location, typically C:\BakFiles\install.exe, and restarts from this new location, creating a decoy without pursuing persistence methods. While SquidLoader itself lacks persistence mechanisms, the delivered Cobalt Strike payload can establish persistence by creating services and modifying registry keys. The shellcode is delivered encrypted with a 5-byte XOR key, enhancing its stealth.

Despite its misleading Word Document appearance, SquidLoader’s samples contain references to popular software products like WeChat and mingw-gcc, further deceiving security researchers. However, this code is never executed as the execution flow is transferred to the payload before reaching these references. Additionally, the malware generates a fake error message in simplified Chinese, claiming a “File format error cannot be opened.”

Evasion Techniques

SquidLoader employs numerous evasion techniques to avoid detection and analysis:

  1. Pointless or Obscure Instructions: It includes obscure x86 instructions like “pause,” “mfence,” or “lfence,” and filler instructions to bypass antivirus emulators.
  2. Encrypted Code Sections: The malware decrypts bundled shellcode in dynamically allocated memory, using single-byte XOR encryption.
  3. In-Stack Encrypted Strings: Sensitive strings are stored as XOR encrypted local variables, decrypted only when needed.
  4. Jumping to the Middle of Instructions: Functions include jumps to addresses within other functions, confusing linear disassemblers and hiding the true code flow.
  5. Return Address Obfuscation: Stack manipulation techniques obscure return addresses, hindering analysis.
  6. Control Flow Graph (CFG) Obfuscation: CFG is flattened into infinite loops with vast switch statements, making it hard to follow the execution order without dynamic analysis.
  7. Debugger Detection: SquidLoader detects and reacts to the presence of debuggers by executing illegal instructions or manipulating key functions to avoid network traffic.
  8. File Checking: The malware exits if it detects certain files, though the purpose of this check remains unclear.
  9. Direct Syscalls: SquidLoader avoids Windows NT APIs by using its own syscall wrappers, bypassing potential hooks and hiding from execution logs.

Payload and Command & Control

The Cobalt Strike payload observed was modified similarly to SquidLoader and lacked anti-debug or anti-VM mechanisms. It mimicked Kubernetes traffic, using specific HTTP headers to communicate with the C&C server. The payload continuously pings the C&C if the response is not as expected, exfiltrating system information and receiving tasks based on predefined headers.

Conclusion

SquidLoader stands out for its extensive evasion techniques and minimal detections. The consistent use of the same Cobalt Strike configuration over two years suggests a focused and persistent threat actor, though not yet classifiable as an APT. Given its success in evading detection, other threat actors may soon adopt SquidLoader’s techniques, posing a broader threat. LevelBlue Labs will continue monitoring this actor and the evolving tactics to keep clients protected from emerging malware threats.

Squidloader

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Email a link to a friend (Opens in new window) Email

Related


Discover more from Open Security Labs

Subscribe to get the latest posts sent to your email.

Tags: cybersecuritymalware
Previous Post

How to protect yourself from ‘Third-Party (Supply Chain) Cyber Attacks’ in a Connected World – 101

Next Post

CDK Global Cyberattack Disrupts Operations for Major Car Dealerships (0penBuckets)

Related Posts

Securing Cloud Identities: Defending Against Networkless Attacks in the SaaS Era 101
Uncategorized

Securing Cloud Identities: Defending Against Networkless Attacks in the SaaS Era 101

3rd May 2024
Unraveling the Akira Ransomware Menace: How a Ruthless Cybercriminal Gang Raked in $42 Million
Uncategorized

Unraveling the Akira Ransomware Menace: How a Ruthless Cybercriminal Gang Raked in $42 Million

26th April 2024
Safeguarding Your Apple Products: 9 Steps to Mitigate the Risk of Arbitrary Code Execution
Uncategorized

Safeguarding Your Apple Products: 9 Steps to Mitigate the Risk of Arbitrary Code Execution

19th April 2024
Safeguarding Multi-Factor Authentication: Cisco Duo Addresses Data Breach
Uncategorized

Safeguarding Multi-Factor Authentication: Cisco Duo Addresses Data Breach

17th April 2024
APT36’s Cyber Arsenal: ElizaRAT and Innovative Linux Attack Vectors
Cybersecurity

APT36’s Cyber Arsenal: ElizaRAT and Innovative Linux Attack Vectors

14th April 2024
Safeguarding Against Google Chrome Vulnerabilities: 5 Best Practices for Secure Browsing
Cybersecurity

Safeguarding Against Google Chrome Vulnerabilities: 5 Best Practices for Secure Browsing

12th April 2024
Next Post
CDK

CDK Global Cyberattack Disrupts Operations for Major Car Dealerships (0penBuckets)

Leave a ReplyCancel reply

  • About
  • Privacy Policy

© 2024 OpenSecurityLabs.com

No Result
View All Result
  • About
  • Privacy Policy

© 2024 OpenSecurityLabs.com

Discover more from Open Security Labs

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from Open Security Labs

Subscribe now to keep reading and get access to the full archive.

Continue reading

 

Loading Comments...