Gootloader now uses 1,000-part ZIP archives for stealthy delivery

Gootloader now uses 1,000-part ZIP archives for stealthy delivery

The Gootloader malware now employs highly sophisticated obfuscation techniques by concatenating up to 1,000 ZIP archives to evade detection. Researchers highlight how these methods challenge analysis tools and can be identified through specific ZIP header anomalies. #Gootloader #WinRAR #YARA

Keypoints

  • Gootloader malware uses concatenated ZIP archives to avoid detection.
  • Malicious files are successfully unpacked by Windows’ default utility but not by 7-Zip or WinRAR.
  • Advanced obfuscation includes corrupting End of Central Directory records and randomizing disk fields.
  • Detection is possible by identifying ZIP header inconsistencies and specific structural anomalies.
  • Defenders are advised to use Notepad for opening JScript files and block wscript.exe and cscript.exe to reduce risks.

Read More: https://www.bleepingcomputer.com/news/security/gootloader-now-uses-1-000-part-zip-archives-for-stealthy-delivery/