By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
Computing

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

News Room
Last updated: 2025/12/19 at 10:47 AM
News Room Published 19 December 2025
Share
Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
SHARE

Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a distribution vector for a new version of a modular and stealthy loader known as CountLoader.

The campaign “uses CountLoader as the initial tool in a multistage attack for access, evasion, and delivery of additional malware families,” Cyderes Howler Cell Threat Intelligence team said in an analysis.

CountLoader was previously documented by both Fortinet and Silent Push, detailing the loader’s ability to push payloads like Cobalt Strike, AdaptixC2, PureHVNC RAT, Amatera Stealer, and PureMiner. The loader has been detected in the wild since at least June 2025.

The latest attack chain begins when unsuspecting users attempt to download cracked versions of legitimate software like Microsoft Word, which causes them to be redirected to a MediaFire link hosting a malicious ZIP archive, which contains an encrypted ZIP file and a Microsoft Word document with the password to open the second archive.

Present within the ZIP file is a renamed legitimate Python interpreter (“Setup.exe”) that has been configured to execute a malicious command to retrieve CountLoader 3.2 from a remote server using “mshta.exe.”

Cybersecurity

To establish persistence, the malware creates a scheduled task that mimics Google by using the name “GoogleTaskSystem136.0.7023.12” along with an identifier-like string. It’s configured to run every 30 minutes for 10 years by invoking “mshta.exe” with a fallback domain.

It also checks if CrowdStrike’s Falcon security tool is installed on the host by querying the antivirus list via Windows Management Instrumentation (WMI). If the service is detected, the persistence command is tweaked to “cmd.exe /c start /b mshta.exe .” Otherwise, it directly reaches out to the URL using “mshta.exe.”

CountLoader is equipped to profile the compromised host and fetch the next-stage payload. The newest version of the malware adds capabilities to propagate via removable USB drives and execute the malware directly in memory via “mshta.exe” or PowerShell. The complete list of supported features is as follows-

  • Download an executable from a provided URL and execute it
  • Download a ZIP archive from a provided URL and executes either a Python-based module or an EXE file present within it
  • Download a DLL from a provided URL and run it via “rundll32.exe”
  • Download an MSI installer package and install it
  • Remove a scheduled task used by the loader
  • Collect and exfiltrate extensive system information
  • Spread via removable media by creating malicious shortcuts (LNK) next to their hidden original counterparts that, when launched, execute the original file and run the malware via “mshta.exe” with a C2 parameter
  • Directly launch “mshta.exe” against a provided URL
  • Execute a remote PowerShell payload in memory

In the attack chain observed by Cyderes, the final payload deployed by the CountLoader is an information stealer known as ACR Stealer, which is equipped to harvest sensitive data from infected hosts.

“This campaign highlights CountLoader’s ongoing evolution and increased sophistication, reinforcing the need for proactive detection and layered defense strategies,” Cyderes said. “Its ability to deliver ACR Stealer through a multi-stage process starting from Python library tampering to in-memory shellcode unpacking highlights a growing trend of signed binary abuse and fileless execution tactics.”

YouTube Ghost Network Delivers GachiLoader

The disclosure comes as Check Point disclosed details of a new, heavily obfuscated JavaScript malware loader dubbed GachiLoader that’s written in Node.js. The malware is distributed by means of the YouTube Ghost Network, a network of compromised YouTube accounts that engage in malware distribution.

“One variant of GachiLoader deploys a second-stage malware, Kidkadi, that implements a novel technique for Portable Executable (PE) injection,” security researchers Sven Rath and Jaromír Hořejší said. “This technique loads a legitimate DLL and abuses Vectored Exception Handling to replace it on-the-fly with a malicious payload.”

As many as 100 YouTube videos have been flagged as part of the campaign, amassing approximately 220.000 views. These videos were uploaded from 39 compromised accounts, with the first video dating back to December 22, 2024. A majority of these videos have since been taken down by Google.

Cybersecurity

In at least one case, GachiLoader has served as a conduit for the Rhadamanthys information stealer malware. Like other loaders, GachiLoader is used to deploy additional payloads to an infected machine, while simultaneously performing a series of anti-analysis checks to fly under the radar.

It also checks if it’s running in an elevated context by running the “net session” command. In the event the execution fails, it attempts to start itself with admin privileges, which, in turn, triggers a User Account Control (UAC) prompt. There are high chances that the victim will allow it to continue, as the malware is likely to be distributed through fake installers for popular software, as outlined in the case of CountLoader.

In the last phase, the malware attempts to kill “SecHealthUI.exe,” a process associated with Microsoft Defender, and configures Defender exclusions to avoid the security solution from flagging malicious payloads staged in certain folders (e.g., C:Users, C:ProgramData, and C:Windows).

GachiLoader then proceeds to either directly fetch the final payload from a remote URL or employ another loader named “kidkadi.node,” which then loads the main malware by abusing Vectored Exception Handling.

“The threat actor behind GachiLoader demonstrated proficiency with Windows internals, coming up with a new variation of a known technique,” Check Point said. “This highlights the need for security researchers to stay up-to-date with malware techniques such as PE injections and to proactively look for new ways in which malware authors try to evade detection.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article YouTube Down In India! Thousands Of Users Report Website Issues And Video Streaming YouTube Down In India! Thousands Of Users Report Website Issues And Video Streaming
Next Article The Com: the growing cybercrime network behind recent Pornhub hack The Com: the growing cybercrime network behind recent Pornhub hack
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

This Chrome Extension Turns LinkedIn Posts About AI Into Facts About Allen Iverson
This Chrome Extension Turns LinkedIn Posts About AI Into Facts About Allen Iverson
Gadget
Linux 6.12 To Linux 6.18 LTS Upgrade Offers Worthwhile Benefits For 5th Gen AMD EPYC
Linux 6.12 To Linux 6.18 LTS Upgrade Offers Worthwhile Benefits For 5th Gen AMD EPYC
Computing
Save  on the best 3D printer for beginners
Save $80 on the best 3D printer for beginners
News
Deals: iPad 4, M5 MacBook, Apple Pencil, Magic Mouse, more 9to5Mac
Deals: iPad $274, M5 MacBook, Apple Pencil, Magic Mouse, more 9to5Mac
News

You Might also Like

Linux 6.12 To Linux 6.18 LTS Upgrade Offers Worthwhile Benefits For 5th Gen AMD EPYC
Computing

Linux 6.12 To Linux 6.18 LTS Upgrade Offers Worthwhile Benefits For 5th Gen AMD EPYC

4 Min Read
TSMC considers overseas 2nm production after 2025 · TechNode
Computing

TSMC considers overseas 2nm production after 2025 · TechNode

1 Min Read
👨🏿‍🚀 Daily – It’s here: The Builders’ List 2025 |
Computing

👨🏿‍🚀 Daily – It’s here: The Builders’ List 2025 |

4 Min Read
Instagram ads: Everything you need to know in 2026
Computing

Instagram ads: Everything you need to know in 2026

30 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?