Gootloader operates as a malware‑as‑a‑service payload delivery system that leverages compromised WordPress sites and SEO poisoning to reach targets, with law firms frequently affected. The campaign uses cloaking, obfuscated JavaScript, and PowerShell‑based stages to deliver, execute, and persist malware while evading researchers. #Gootloader #SEOpoisoning #WordPress #LegalFirms #PowerShell #MalwareAsAService
Keypoints
- Gootloader is described as a malware‑as‑a‑service operation delivering a malware payload for other actors.
- SEO poisoning of compromised WordPress sites is used to lure victims searching for legal documents, with law firms being a common target.
- A cloaking mechanism and fake forum overlay are used to present benign content until a target is reached, masking the malicious payload.
- The delivery chain relies on a ZIP containing a malicious JS that is hidden inside a legitimate JavaScript library and deobfuscated at runtime.
- A scheduled task (“Anger Management”) and a drop file in AppData are used for persistence and execution.
- PowerShell reconnaissance and staging are employed, including system information collection, network scanning, and remote command capabilities.
- IOCs include specific file names and hashes, ZIP/JS payloads, multiple URLs, and a distinctive user‑agent pattern.
MITRE Techniques
- [T1189] Drive-by Compromise – SEO poisoning used to lure victims into downloading the malicious payload. Quote: “The initial vector of this attack utilizes a technique called Search Engine Optimization (SEO) poisoning to lure victims into downloading the malicious payload.”
- [T1566.002] Phishing: Spearphishing Link – Visitors to poisoned search results are directed to a page that mimics a forum to entice a download. Quote: “When visiting a poisoned link from the search engine result, the user will be directed to a page that mimics a forum.”
- [T1036] Masquerading – The fake forum page employs social engineering tactics to entice clicks on a direct download. Quote: “This fake forum page employs social engineering tactics to entice the user to click on a direct download link for the desired document file.”
- [T1027] Obfuscated/Compressed Files and Information – The external JavaScript is obfuscated, loaded from a script, and later deobfuscated/executed. Quote: “an external JavaScript is being loaded. This obfuscated JavaScript is responsible for overlaying the fake forum page…”
- [T1053.005] Scheduled Task – A new scheduled task named “Anger Management” is created to run dropped payloads. Quote: “A new scheduled task is created using a predefined task name “Anger Management”.”
- [T1059.001] PowerShell – PowerShell reconnaissance and stager; hardcoded PowerShell snippet executed via cscript/wscript. Quote: “The code contains a hardcoded PowerShell snippet that is executed…”
- [T1082] System Information Discovery – The stager collects OS version, environment paths, running processes, open windows, etc. Quote: “Environment paths… Windows OS version… Running process names… Titles of all open windows” and similar.
- [T1041] Exfiltration – Collected data is compressed, Base64‑encoded, and sent via HTTP Cookie header. Quote: “The stolen information is compressed using GZIP and then encoded with Base64. The stolen information is then sent to the URL via the HTTP Cookie header.”
- [T1046] Network Service Discovery – The PowerShell network scanner checks whether SMB and Windows Remote Management are open. Quote: “A PowerShell script that conducts network scans and fingerprinting of the local network, specifically examining if SMB (Server Message Block) and Windows Remote Management are open.”
- [T1047] Windows Management Instrumentation – WMI is used to gather system information. Quote: “the script utilizes the WMI (Windows Management Instrumentation) and ‘gps’ (Get-Process) PowerShell commands.”
Indicators of Compromise
- [File Name] technical services and spares supply agreement 35528.js and technical services and spares supply agreement 35528.zip – example1, example2, and other items
- [SHA256] 0afe27f33637dbb8c7aea69e1cb91b4eace2a0840bb819e30ab089221fb35d36, 5bdc36838cfae33bbcc027be7e70228fb76d35828d1a21b8b53f2413598634e0
- [SHA1] d812feccb9172dd0ecc6290f025f0a3f17208379, ae4c425e8139dba850bcf978f6e889d10df45a7a
- [MD5] 96cf6b2e9e27db0c03b06fbc06b81854, 799f0f4b22c273bbe07790e7fa8c0c68
- [URLs] https://projectspace.org.hk/technical-services-and-spares-supply-agreement/, https://projectspace.org.hk/?a96fc4b=1976965, https://drachtstercompagnie.frl/download.php, https://druczki.pl/download.php, https://camtel.cosavostra.com/xmlrpc.php, https://civpro.io/xmlrpc.php
- [URLs] (additional examples from the article’s list) https://construtoraconarte.com.br/xmlrpc.php, https://bqrc.es/xmlrpc.php, https://healthforcesuperfoods.com/xmlrpc.php
- [User-Agent] Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36