Hackers Use ModernLoader to Infect Programs with Stealers and Cryptominers

As many as three disparate however associated campaigns between March and Jun 2022 have been discovered to ship a wide range of malware, together with ModernLoader, RedLine Stealer, and cryptocurrency miners onto compromised methods.

“The actors use PowerShell, .NET assemblies, and HTA and VBS information to unfold throughout a focused community, ultimately dropping different items of malware, such because the SystemBC trojan and DCRat, to allow numerous phases of their operations,” Cisco Talos researcher Vanja Svajcer mentioned in a report shared with The Hacker Information.


The malicious implant in query, ModernLoader, is designed to offer attackers with distant management over the sufferer’s machine, which allows the adversaries to deploy further malware, steal delicate data, and even ensnare the pc in a botnet.

Cisco Talos attributed the infections to a beforehand undocumented however Russian-speaking menace actor, citing the usage of off-the-shelf instruments. Potential targets included Jap European customers in Bulgaria, Poland, Hungary, and Russia.

An infection chains found by the cybersecurity agency contain makes an attempt to compromise susceptible net functions like WordPress and CPanel to distribute the malware via information that masquerade as pretend Amazon present playing cards.

Stealers, Cryptominers and RATs

The primary stage payload is a HTML Utility (HTA) file that runs a PowerShell script hosted on the command-and-control (C2) server to provoke the deployment of intertim payloads that in the end inject the malware utilizing a method referred to as course of hollowing.

Described as a easy .NET distant entry trojan, ModernLoader (aka Avatar bot) is supplied with options to assemble system data, execute arbitrary instructions, or obtain and run a file from the C2 server, permitting the adversary to change the modules in real-time.


Cisco’s investigation additionally unearthed two earlier campaigns in March 2022 with comparable modus operandi that leverage ModerLoader as the first malware C2 communications and serve further malware, together with XMRig, RedLine Stealer, SystemBC, DCRat, and a Discord token stealer, amongst others.

“These campaigns painting an actor experimenting with completely different know-how,” Svajcer mentioned. “The utilization of ready-made instruments exhibits that the actor understands the TTPs required for a profitable malware marketing campaign however their technical expertise will not be developed sufficient to completely develop their very own instruments.”

Latest articles

Related articles

Leave a reply

Please enter your comment!
Please enter your name here