{"id":25429,"date":"2024-11-06T05:20:54","date_gmt":"2024-11-06T13:20:54","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/11\/06\/news-19159\/"},"modified":"2024-11-06T05:20:54","modified_gmt":"2024-11-06T13:20:54","slug":"news-19159","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/11\/06\/news-19159\/","title":{"rendered":"Bengal cat lovers in Australia get psspsspss\u2019d in Google-driven Gootloader campaign"},"content":{"rendered":"<p><strong>Credit to Author: gallagherseanm| Date: Wed, 06 Nov 2024 11:30:41 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Once used exclusively by the cybercriminals behind REVil ransomware and the Gootkit banking trojan, GootLoader and its primary payload have evolved into an initial access as a service platform\u2014with Gootkit providing information stealing capabilities as well as the capability to deploy post-exploitation tools and ransomware.<\/p>\n<p>GootLoader is known for using search engine optimization (SEO) poisoning for its initial access. Victims are often enticed into clicking on malicious adware or links disguised as legitimate marketing, or in this case a legitimate Google search directing the user to a compromised website hosting a malicious payload masquerading as the desired file. If the malware remains undetected on the victim\u2019s machine, it makes way for a second-stage payload known as GootKit, which is a highly evasive info stealer and remote access Trojan (RAT) used to establish a persistent foothold in the victim&#8217;s network environment.\u00a0 GootKit can be used to deploy ransomware or other tools, including Cobalt Strike, for follow-on exploitation.<\/p>\n<p>Detection of a new GootLoader variant actively being used by adversaries earlier this year led to a broad threat hunting campaign by Sophos X-Ops MDR for GootLoader instances across customer environments. As is typical of Gootloader, the new variant was found to be using SEO poisoning\u2014the use of search engine optimization tactics to put malicious websites controlled by GootLoader&#8217;s operators high in the results for specific search terms\u2014to deliver the new, JavaScript-based Gootloader package.\u00a0 In this case, we found the GootLoader actors using search results for information about a particular cat and a particular geography being used to deliver the payload: &#8220;Are Bengal Cats legal in Australia?&#8221;<\/p>\n<p>During the threat hunt campaign, MDR discovered a .zip archive used to deliver\u00a0 GootLoader&#8217;s first-stage payload while reviewing an impacted user&#8217;s browser history. This allowed MDR to identify the compromised website that was hosting the malicious payload. This report highlights the MDR investigation process and the technical details of the uncovered GootLoader campaign.<\/p>\n<h2>Technical Analysis and Identification<\/h2>\n<h3>First-stage payload<\/h3>\n<p>On March 27, 2024, the MDR team performed a proactive threat hunting campaign across multiple customers estates, following recently reported identification of a new GootLoader variant being actively exploited in the wild.<\/p>\n<p>Our investigation revealed the threat actor was using SEO poisoning through an easily accessed online forum found via a simple Google search, initiated by the user for &#8216;Do you need a license to own a Bengal cat in Australia&#8217;. The first search result took us to this URL:<\/p>\n<pre> hxxps[:\/\/]ledabel[.]be\/en\/are-bengal-cats-legal-in-australia-understanding-the-laws-and-regulations\/#:~:text=Each%20state%20and%20territory%20in,to%20keep%20them%20as%20pets.<\/pre>\n<p>Immediately after the user clicks the link, a suspicious .zip file was downloaded to C:Users&lt;Username&gt;DownloadsAre_bengal_cats_legal_in_australia_33924.zip onto the victim&#8217;s machine, and the user&#8217;s browser was directed to the URL\u00a0 hxxps:[\/\/]www[.]chanderbhushan[.]com\/doc[.]php.<\/p>\n<figure id=\"attachment_958296\" aria-describedby=\"caption-attachment-958296\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/seo-poison-gootloader1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958296 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/seo-poison-gootloader1.png\" alt=\"Figure 1: An SEO-poisoned site hosting a malicious .zip file\u00a0\" width=\"640\" height=\"421\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/seo-poison-gootloader1.png 1054w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/seo-poison-gootloader1.png?resize=300,197 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/seo-poison-gootloader1.png?resize=768,505 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/seo-poison-gootloader1.png?resize=1024,673 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958296\" class=\"wp-caption-text\">Figure 1: An SEO-poisoned site hosting a malicious .zip file<\/figcaption><\/figure>\n<h3>Second-stage payload<\/h3>\n<p>Upon review of the running processes, we were able to determine that a small JavaScript file was dropping a large JavaScript file at the location C:Users&lt;Username&gt;AppDataRoamingMicrosoft on the user\u2019s machine. During our testing, the large JavaScript file generated by the malicious site and its name, downloaded to the user&#8217;s %temp% directory, were different each time the initial JavaScript was executed. The file we observed in this case was named Temp1_Are_bengal_cats_legal_in_australia_33924.zipare_bengal_cats_legal_in_australia_80872.js.<\/p>\n<p>We additionally observed the creation of a scheduled task named &#8220;Business Aviation&#8221; with the command line &#8220;wscript REHABI~1.JS&#8221; (as shown in Figure 3). This was suspected to be a persistence method in which the threat actor was utilizing WScript.exe to execute the second-stage payload of GootKit.<\/p>\n<figure id=\"attachment_958305\" aria-describedby=\"caption-attachment-958305\" style=\"width: 1718px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958305 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_2.png\" alt=\"Figure 2: A log of running processes, including the execution of wscript.exe to launch the second stage via a scheduled task.\u00a0\" width=\"1718\" height=\"468\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_2.png 1718w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_2.png?resize=300,82 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_2.png?resize=768,209 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_2.png?resize=1024,279 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_2.png?resize=1536,418 1536w\" sizes=\"auto, (max-width: 1718px) 100vw, 1718px\" \/><\/a><figcaption id=\"caption-attachment-958305\" class=\"wp-caption-text\">Figure 2: A log of running processes, including the execution of wscript.exe to launch the second stage via a scheduled task.<\/figcaption><\/figure>\n<figure id=\"attachment_958306\" aria-describedby=\"caption-attachment-958306\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958306 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_3.png\" alt=\"Figure 3: A scheduled task is created to launch the second stage JavaScript.\u00a0\" width=\"640\" height=\"22\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_3.png 684w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_3.png?resize=300,11 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958306\" class=\"wp-caption-text\">Figure 3: A scheduled task is created to launch the second stage JavaScript.<\/figcaption><\/figure>\n<p>We also noted the utilization of the command C:WindowsSystem32cscript.exe REHABI~1.JS spawning PowerShell.exe, as shown in Figure 4. The cscript.exe command line tool is specific to Windows Server. The commands passed to PowerShell were not captured in this case.<\/p>\n<figure id=\"attachment_958318\" aria-describedby=\"caption-attachment-958318\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958318 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_4.png\" alt=\"Figure 4: A PowerShell command line spawned by CSript.exe\u00a0\" width=\"640\" height=\"14\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_4.png 2566w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_4.png?resize=300,7 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_4.png?resize=768,17 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_4.png?resize=1024,22 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_4.png?resize=1536,34 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_4.png?resize=2048,45 2048w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958318\" class=\"wp-caption-text\">Figure 4: A PowerShell command line spawned by CScript<\/figcaption><\/figure>\n<p>However, examining the URL history, we observed PowerShell.exe reaching out to the following domains, as shown in Figure 5.\u00a0Third-stage payload<\/p>\n<p>In the case the MDR team examined, our team did not observe the third stage being successful in reaching a full deployment of GootKit, preventing the download of any additional malicious tooling. This stage typically is where the deployment of additional tools such as Cobalt Strike occurs, or when ransomware is added to the victim\u2019s machine.<\/p>\n<h2>Malware Triage<\/h2>\n<h3>Static Analysis<\/h3>\n<p>MDR performed a static analysis of the of the .zip sample obtained from the malicious URL hxxps[:\/\/]ledabel[.]be\/en\/are-bengal-cats-legal-in-australia-understanding-the-laws-and-regulations\/#:~:text=In%20most%20cases%2C%20you%20do,a%20Bengal%20cat%20in%20Australia. Within the zip file was a JavaScript named &#8220;are bengal cats legal in australia 72495.js&#8221;.<\/p>\n<p>As we noted above, the JavaScript&#8217;s name is modified each time the file is downloaded with a different concluding numerical sequence. This was also observed when extracting the small JavaScript from the zip file, as shown in Figure 6. For example, users may observe a filename with are bengal cats legal in australia 75876.zip instead, when attempting to obtain a sample from the malicious URL.<\/p>\n<figure id=\"attachment_958316\" aria-describedby=\"caption-attachment-958316\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958316 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_6.png\" alt=\"Figure 6:\u00a0 Sandboxed browser (Browserling) results when accessing the website and clicking on the malicious hyperlinked URL\u00a0\" width=\"640\" height=\"404\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_6.png 852w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_6.png?resize=300,189 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_6.png?resize=768,485 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958316\" class=\"wp-caption-text\">Figure 6:\u00a0 Sandboxed browser (Browserling) results when accessing the website and clicking on the malicious hyperlinked URL<\/figcaption><\/figure>\n<p>A string analysis of the dropped file was not useful in identifying its intent, as the JavaScript was heavily obfuscated\u2014as is common in Gootloader samples. The script also included boilerplate licensing comments to make it appear to be a legitimate JavaScript, as shown in Figure 7.<\/p>\n<figure id=\"attachment_958315\" aria-describedby=\"caption-attachment-958315\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958315 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_7.png\" alt=\"Figure 7: The Strings output of are bengal cats legal in australia 72495.js \" width=\"640\" height=\"467\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_7.png 828w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_7.png?resize=300,219 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_7.png?resize=768,560 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958315\" class=\"wp-caption-text\">Figure 7: The Strings output of are bengal cats legal in australia 72495.js<\/figcaption><\/figure>\n<p>However, Strings analysis of the secondary larger JavaScript that was downloaded into C:Users&lt;Username&gt;AppDataRoamingNotepad++Small Unit Tactics.js revealed a heavily obfuscated script, as shown in Figure 8.<\/p>\n<figure id=\"attachment_958314\" aria-describedby=\"caption-attachment-958314\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958314 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_8.png\" alt=\"\" width=\"640\" height=\"474\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_8.png 750w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_8.png?resize=300,222 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958314\" class=\"wp-caption-text\">Figure 8: The Strings output of C:Users\\AppDataRoamingNotepad++Small Unit Tactics.js<\/figcaption><\/figure>\n<p>MDR used a <a href=\"https:\/\/github.com\/mandiant\/gootloader\/blob\/main\/GootLoaderAutoJsDecode.py\">Python script created by Mandiant for auto-decoding of GootLoader JavaScript<\/a> to statically analyze the initially downloaded Are_bengal_cats_legal_in_australia_72495.js. As shown in Figure 9, the file was identified as Gootloader variant 3.0 through the obfuscation method, where the first file created was named Huthwaite SPIN selling.dat followed by Small Units Tactics.js and Scheduled Task named Destination Branding. The decoder also identified various malicious domain names within the obfuscated strings.<\/p>\n<figure id=\"attachment_958313\" aria-describedby=\"caption-attachment-958313\" style=\"width: 612px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958313 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_9.png\" alt=\"Figure 9:\u00a0 Mandiant\u2019s python script for auto-decoding GootLoader\u2019s JavaScript\u00a0 displays the output of Are_bengal_cats_legal_in_australia_72495.js\u00a0\" width=\"612\" height=\"566\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_9.png 612w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_9.png?resize=300,277 300w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><\/a><figcaption id=\"caption-attachment-958313\" class=\"wp-caption-text\">Figure 9:\u00a0 Mandiant\u2019s python script for auto-decoding GootLoader\u2019s JavaScript\u00a0 displays the output of Are_bengal_cats_legal_in_australia_72495.js<\/figcaption><\/figure>\n<h3>Dynamic analysis<\/h3>\n<figure id=\"attachment_958312\" aria-describedby=\"caption-attachment-958312\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958312 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_10.png\" alt=\"Figure 10: The process Monitor CreateFile event for WScript.exe upon execution of Are_bengal_cats_legal_in_australia_72495.js\u00a0\" width=\"640\" height=\"106\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_10.png 1498w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_10.png?resize=300,50 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_10.png?resize=768,127 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_10.png?resize=1024,170 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958312\" class=\"wp-caption-text\">Figure 10: The process Monitor CreateFile event for WScript.exe upon execution of Are_bengal_cats_legal_in_australia_72495.js<\/figcaption><\/figure>\n<p>Various dynamic analysis tools were utilized to examine the behavior of the malicious JavaScript. Upon execution, WScript.exe was observed creating the first file located within C:Users&lt;Username&gt;AppDataRoamingNotepad++ , as shown in Figure 10. Despite being observed via Windows Sysinternals Process Monitor with a CreateFile event, this was not written to disk and no deletion event was seen.\u00a0<i><br \/> <\/i><\/p>\n<p>Shortly after Wscript.exe executed Are_bengal_cats_legal_in_australia_72495.js, Process Hacker showed CScript.exe and Powershell.exe being created with a conhost.exe spawned, as shown in Figure 11. MDR observed that Wscript.exe would terminate, followed by Cscript.exe that would also terminate shortly after, after which Powershell.exe was created.<\/p>\n<figure id=\"attachment_958311\" aria-describedby=\"caption-attachment-958311\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958311 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_11.png\" alt=\"Figure 11: Process behavior observed within Source Forge's Process Hacker\u00a0\" width=\"640\" height=\"140\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_11.png 1110w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_11.png?resize=300,66 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_11.png?resize=768,168 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_11.png?resize=1024,224 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958311\" class=\"wp-caption-text\">Figure 11: Process behavior observed within Source Forge&#8217;s Process Hacker<\/figcaption><\/figure>\n<p>Persistence was obtained via CScript.exe executing the file SMALLU~1.js via a scheduled task named Destination Branding (with command line wscript SMALLU ~1.js , as shown in Figure 12). During the lab analysis, the secondary JavaScript can be dropped within any folders located within C:Users&lt;Username&gt;AppDataRoaming&lt;at any existing folder&gt;.<\/p>\n<figure id=\"attachment_958341\" aria-describedby=\"caption-attachment-958341\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958341 size-large\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_12.jpg?w=640\" alt=\"Figure 12: Process Hacker process properties and Scheduled Task creation\u00a0\" width=\"640\" height=\"301\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_12.jpg 1543w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_12.jpg?resize=300,141 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_12.jpg?resize=768,361 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_12.jpg?resize=1024,481 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_12.jpg?resize=1536,722 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-958341\" class=\"wp-caption-text\">Figure 12: Process Hacker process properties and Scheduled Task creation\u00a0(click to enlarge)<\/figcaption><\/figure>\n<p>MDR\u00a0 conducted network and C2 examinations using Wireshark and <a href=\"https:\/\/sourceforge.net\/projects\/fakenet\/\">FakeNet<\/a> to perform a network capture during the execution of Are_bengal_cats_legal_in_australia_72495.js. FakeNet showed various domain names being reached out to with GET \/xmlrpc.php HTTP\/1.1 requests via Powershell.exe. The requests contained Base64-encoded cookies which, when decoded, showed enumeration information regarding device directories and host information such as the folder path of C:Users&lt;Username&gt;AppDataRoaming , as shown in Figure 13. As shown below, the process would read USERNAME and USER DOMAIN information and send the data to the URIs.<\/p>\n<div id='gallery-1' class='gallery galleryid-958247 gallery-columns-3 gallery-size-full'>\n<figure class='gallery-item'>\n<div class='gallery-icon landscape'> \t\t\t\t<a href='https:\/\/news.sophos.com\/en-us\/2024\/11\/06\/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign\/gootloader_fig_13a\/'><img loading=\"lazy\" decoding=\"async\" width=\"606\" height=\"424\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_13a.png\" class=\"attachment-full size-full\" alt=\"\" aria-describedby=\"gallery-1-958309\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_13a.png 606w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_13a.png?resize=300,210 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/a> \t\t\t<\/div><figcaption class='wp-caption-text gallery-caption' id='gallery-1-958309'> \t\t\t\tFigure 13a: FakeNet capture containing encoded Base64 cookies  \t\t\t\t<\/figcaption><\/figure>\n<figure class='gallery-item'>\n<div class='gallery-icon landscape'> \t\t\t\t<a href='https:\/\/news.sophos.com\/en-us\/2024\/11\/06\/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign\/gootloader_fig_13b\/'><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"328\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_13b.png\" class=\"attachment-full size-full\" alt=\"\" aria-describedby=\"gallery-1-958308\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_13b.png 908w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_13b.png?resize=300,154 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_13b.png?resize=768,394 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a> \t\t\t<\/div><figcaption class='wp-caption-text gallery-caption' id='gallery-1-958308'> \t\t\t\tFigure 13b: CyberChef-decoded data\u00a0 \t\t\t\t<\/figcaption><\/figure>\n<\/p><\/div>\n<p>Examination of the PCAP capture lists various domain names that were also identified during static analysis, as shown in Figure 14. These domain names and IOCs have been classified by Sophos Labs as malware\/callhome ; the initial and secondary JavaScript files are classified as JS\/Drop-DIJ and JS\/Gootkit-AW respectively.<\/p>\n<figure id=\"attachment_958307\" aria-describedby=\"caption-attachment-958307\" style=\"width: 606px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-958307 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_14.png\" alt=\"Figure 14: Malicious domain names observed within DNS requests through Wireshark PCAP\u00a0\" width=\"606\" height=\"382\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_14.png 606w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/11\/gootloader_fig_14.png?resize=300,189 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/a><figcaption id=\"caption-attachment-958307\" class=\"wp-caption-text\">Figure 14: Malicious domain names observed within DNS requests through Wireshark PCAP<\/figcaption><\/figure>\n<h2>MITRE mapping<span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p>The following chart maps the observed tactics to the MITRE ATT&amp;CK\u00ae framework.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Conclusion<\/h2>\n<p>GootLoader is one of a number of continuing malware-delivery-as-a-service operations that heavily leverage search results as a means to reach victims. The use of search engine optimization, and abuse of search engine advertising to lure targets to download malware loaders and dropper, are not new\u2014GootLoader has been doing this since at least 2020, and we&#8217;ve observed Raccoon Stealer and other malware-as-a-service operations doing the same for just as long. But we\u2019ve seen continued growth in this approach to initial compromise, with several massive campaigns using this technique over the past year.<\/p>\n<p>Sophos endpoint protection blocks GootLoader through a number of behavioral and malware-specific detections. But users should still look out for search results and search advertisements that seem too good to be true on domains that are off the beaten path\u2014whether they&#8217;re looking to get a Bengal Cat or not.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p>A list of IOCs is available as a CSV file in the Sophos GitHub repository <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/gootloader_cats_iocs.csv\">here<\/a>.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/11\/06\/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/10\/shutterstock_asset-generation-9e8a3dcf-7a9d-4795-a22c-6077ad8cd3d4-2_edited.jpeg\"\/><\/p>\n<p><strong>Credit to Author: gallagherseanm| Date: Wed, 06 Nov 2024 11:30:41 +0000<\/strong><\/p>\n<p> The Internet is full of cats\u2014and in this case, malware-delivering fake cat websites used for very targeted search engine optimization.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[31457,10871,21940,32110,24552,18568,16771],"class_list":["post-25429","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-gootloader","tag-javascript","tag-loader","tag-search-engine-poisoning","tag-security-operations","tag-seo-poisoning","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25429"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25429\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}