By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
Computing

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

News Room
Last updated: 2025/02/20 at 9:10 AM
News Room Published 20 February 2025
Share
SHARE

Feb 20, 2025Ravie LakshmananCybercrime / Malware

A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation.

“The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence Center (ASEC) said. “It is a tool for signing JAR (Java Archive) files.”

The South Korean cybersecurity firm said the malware is propagated in the form of a compressed ZIP archive that includes the legitimate executable as well as the DLLs that are sideloaded to launch the malware –

Cybersecurity

Documents2012.exe, a renamed version of the legitimate jarsigner.exe binary jli.dll, a DLL file that’s modified by the threat actor to decrypt and inject concrt140e.dll concrt140e.dll, the XLoader payload

The attack chain crosses over to the malicious phase when “Documents2012.exe” is run, triggering the execution of the tampered “jli.dll” library to load the XLoader malware.

“The distributed concrt140e.dll file is an encrypted payload that is decrypted during the attack process and injected into the legitimate file aspnet_wp.exe for execution,” ASEC said.

“The injected malware, XLoader, steals sensitive information such as the user’s PC and browser information, and performs various activities such as downloading additional malware.”

A successor to the Formbook malware, XLoader was first detected in the wild in 2020. It’s available for sale to other criminal actors under a Malware-as-a-Service (MaaS) model. In August 2023, a macOS version of the information stealer and keylogger was discovered impersonating Microsoft Office.

“XLoader versions 6 and 7 include additional obfuscation and encryption layers meant to protect critical code and information to defeat signature-based detection and complicate reverse engineering efforts,” Zscaler ThreatLabz said in a two-part report published this month.

Malware via ZIP Archives

“XLoader has introduced techniques that were previously observed in SmokeLoader, including encrypting parts of code at runtime and NTDLL hook evasion.”

Further analysis of the malware has revealed its use of hard-coded decoy lists to blend real command-and-control (C2) network communications with traffic to legitimate websites. Both the decoys and real C2 servers are encrypted using different keys and algorithms.

Like in the case of malware families like Pushdo, the intention behind using decoys is to generate network traffic to legitimate domains in order to disguise real C2 traffic.

Cybersecurity

DLL side-loading has also been abused by the SmartApeSG (aka ZPHP or HANEYMANEY) threat actor to deliver NetSupport RAT via legitimate websites compromised with JavaScript web injects, with the remote access trojan acting as a conduit to drop the StealC stealer.

The development comes as Zscaler detailed two other malware loaders named NodeLoader and RiseLoader that has been used to distribute a wide range of information stealers, cryptocurrency miners, and botnet malware such as Vidar, Lumma, Phemedrone, XMRig, and Socks5Systemz.

“RiseLoader and RisePro share several similarities in their network communication protocols, including message structure, the initialization process, and payload structure,” it noted. “These overlaps may indicate that the same threat actor is behind both malware families.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The iPhone is done with home buttons — here’s why I’ll miss it
Next Article iPhone 16: Release date, features, review, price, AI, and more
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

NotebookLM makes its Android debut, complete with Audio Overviews (Update: Official)
News
China sets up taskforce to boost development of solid-state EV batteries · TechNode
Computing
PM threatens ‘further action’ if Israel doesn’t abandon plan to take over Gaza
News
China’s smartphone shipments reach 289 million units, up 6.5% y-o-y in 2023 · TechNode
Computing

You Might also Like

Computing

China sets up taskforce to boost development of solid-state EV batteries · TechNode

1 Min Read
Computing

China’s smartphone shipments reach 289 million units, up 6.5% y-o-y in 2023 · TechNode

1 Min Read

TuSimple shifts to Asia Pacific amid Nasdaq delisting · TechNode

1 Min Read
Computing

Xianyu to open first offline secondhand marketplace as Alibaba emphasizes high hopes for the platform · TechNode

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?