Safety researchers at AhnLab Safety Intelligence Heart (ASEC) have uncovered a brand new marketing campaign leveraging the professional JAR signing instrument, jarsigner.exe, to distribute the XLoader malware.
The assault employs a DLL side-loading method, the place malicious DLL information are positioned alongside professional executable information to make sure their execution when the professional software is run.
This technique exploits the belief related to professional software program to bypass safety defenses.
Malicious DLL Aspect-Loading Method Recognized
The jarsigner instrument, a element of the Eclipse Basis’s Built-in Improvement Setting (IDE) package deal, is usually used for signing Java Archive (JAR) information.
Nevertheless, on this assault, it has been weaponized by bundling it with malicious information in a compressed archive.
The archive incorporates three key elements: a professional executable file renamed as Documents2012.exe, and two malicious DLLs jli.dll and concrt140e.dll.


Anatomy of the Assault
The malicious jli.dll serves as the first enabler of the assault.
In contrast to its professional counterpart, which incorporates distinct export features, this tampered model maps all export features to a single deal with, making certain that any perform name triggers the attacker’s code.
This DLL decrypts and injects the second malicious file, concrt140e.dll, right into a professional course of (aspnet_wp.exe), successfully deploying the XLoader malware.
XLoader is a sophisticated information-stealing malware able to exfiltrating delicate information equivalent to browser credentials and system info.
In response to ASEC, it could additionally obtain extra payloads, amplifying its menace potential.
The malicious information on this marketing campaign lack legitimate digital signatures, in contrast to the professional elements signed by the Eclipse Basis, making them identifiable upon shut inspection.
This assault highlights the hazards of DLL side-loading, the place menace actors exploit belief in professional software program to execute malicious code.
By distributing these information collectively in compressed archives, attackers purpose to deceive customers into executing them with out suspicion.
To mitigate such threats, customers and organizations are suggested to:
- Train warning when dealing with executable information bundled with DLLs from unverified sources.
- Frequently replace endpoint safety instruments to detect unsigned or suspicious DLLs.
- Monitor for anomalous behaviors in trusted purposes that would point out tampered elements.
The MD5 hashes related to this marketing campaign (42f5b18d194314f43af6a31d05e96f16 and 8e6763e7922215556fa10711e1328e08) and suspicious URLs (e.g., http[:]//www[.]datarush[.]life/uhtg/) needs to be actively blocked in safety methods.
As attackers proceed refining their methods, proactive measures stay crucial to safeguarding methods in opposition to refined threats like XLoader.
Free Webinar: Higher SOC with Interactive Malware Sandbox for Incident Response and Risk Searching – Register Right here