• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new cherryloader malware mimics cherrytree to deploy privesc exploits

New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits

You are here: Home / General Cyber Security News / New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits
January 25, 2024

A new Go-based malware loader known as CherryLoader has been learned by threat hunters in the wild to produce extra payloads on to compromised hosts for adhere to-on exploitation.

Arctic Wolf Labs, which uncovered the new attack device in two the latest intrusions, stated the loader’s icon and name masquerades as the genuine CherryTree take note-getting application to dupe potential victims into setting up it.

“CherryLoader was employed to drop 1 of two privilege escalation instruments, PrintSpoofer or JuicyPotatoNG, which would then operate a batch file to establish persistence on the victim machine,” scientists Hady Azzam, Christopher Prest, and Steven Campbell mentioned.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In an additional novel twist, CherryLoader also packs modularized characteristics that make it possible for the menace actor to swap exploits without recompiling code.

Cybersecurity

It’s currently not recognised how the loader is distributed, but the attack chains examined by the cybersecurity business display that CherryLoader (“cherrytree.exe”) and its associated documents (“NuxtSharp.Facts,”https://thehackernews.com/2024/01/”Spof.Facts,” and “Juicy.Info”) are contained in a RAR archive file (“Packed.rar”) hosted on the IP tackle 141.11.187[.]70.

Downloaded alongside with the RAR file is an executable (“key.exe”) which is utilised to unpack and launch the Golang binary, which only proceeds if the initial argument passed to it matches a really hard-coded MD5 password hash.

The loader subsequently decrypts “NuxtSharp.Info” and writes its contents to a file named “File.log” on disk that, in convert, is designed to decode and run “Spof.Information” as “12.log” employing a fileless method recognized as process ghosting that initially arrived to light-weight in June 2021.

“This system is modular in layout and will allow the menace actor to leverage other exploit code in spot of Spof.Knowledge,” the researchers reported. “In this situation, Juicy.Knowledge which consists of a diverse exploit, can be swapped in position with no recompiling File.log.”

Cybersecurity

The system connected with “12.log” is linked to an open up-source privilege escalation tool named PrintSpoofer, even though “Juicy.Information” is a further privilege escalation tool named JuicyPotatoNG.

A thriving privilege escalation is followed by the execution of a batch file script identified as “user.bat” to set up persistence on the host and disarm Microsoft Defender.

“CherryLoader is [a] newly determined multi-phase downloader that leverages distinct encryption procedures and other anti-analysis methods in an try to detonate alternative, publicly obtainable privilege escalation exploits devoid of getting to recompile any code,” the scientists concluded.

Found this write-up appealing? Adhere to us on Twitter  and LinkedIn to go through extra exceptional written content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «tech giant hp enterprise hacked by russian hackers linked to Tech Giant HP Enterprise Hacked by Russian Hackers Linked to DNC Breach
Next Post: China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware china backed hackers hijack software updates to implant "nspx30" spyware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.