The Information Highway

The Information Highway

Font size: +
2 minutes reading time (381 words)

New malware loader – BabbleLoader

Threat update

BabbleLoader is a newly identified malware loader designed for delivering information-stealing payloads such as WhiteSnake and Meduza. It demonstrates sophisticated evasion techniques that challenge both traditional antivirus solutions and modern AI-driven detection systems. Read this Cybersecurity Threat Advisory to learn how to protect against this cutting-edge malware loader. 

Technical Detail and Additional Info

What is the threat?

BabbleLoader is a modular loader that uses a variety of techniques to evade detection. It loads shellcode that paves the way for decrypted code, a Donut loader, which unpacks and executes the stealer malware. The techniques to avoid detection, include:

  • Packing the code to make it difficult to analyze
  • Encrypting the code to make it difficult to understand
  • Using anti-debugging techniques to prevent analysis
  • Using in-memory execution to avoid detection by traditional antivirus solutions

Why is it noteworthy?

BabbleLoader uses junk codes and metamorphic transformations to avoid detection. It dynamically resolves functions at runtime, impeding static and behavioral analysis. Its structure varies per sample, making signature-based identification difficult. The malware first loads encrypted shellcode, which then unpacks further components like the Donut loader, responsible for deploying the final payload (WhiteSnake or Meduza). This layered approach enhances the protection of malicious payloads, designed to bypass antivirus and sandbox environments to deliver stealers into memory. 

What is the exposure or risk?

It targets English and Russian speaking users who are looking for cracked software to download, as well as business professionals looking for accounting and HR software. It can lead users and companies exposed to data theft, financial loss, compromised systems, and potential ransomware follow-ups. 

What are the recommendations?

 LBT Technology Group recommends the following actions to mitigate the risks associated with this stealthy malware loader:

  • Update all systems to the latest version to patch any vulnerabilities that may be exploited regularly.
  • Employ robust endpoint security solutions with advanced threat detection capabilities, such as LBT's XDR Endpoint Security, to protect systems against potential threats.
  • Educate users about the risk of downloading software from unofficial sources.
  • Block known malicious domains and IPs linked to BabbleLoader campaigns and use filtering and logging to detect anomalous communications.

References

 For more in-depth information about the recommendations, please visit the following links:


If you have any questions, please contact LBT's Sales Engineer.


Kemp LoadMaster and VMware vCenter vulnerabilities
Phishing campaign spreading Remcos RAT malware

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Saturday, 28 December 2024

Captcha Image

Top Breaches Of 2023

Customers Affected In T-Mobile Breach
Accounts Affected In MOVEit Breach
Customers Affected In MCNA Insurance Data Breach
Individuals Affected In PharMerica Data Breach
Users Affected In ChatGPT Major Data Breach
*Founder Shield End of Year 2023