Categories: Cyber Security News

New CountLoader Malware Uses Weaponized PDF to Deliver Ransomware

Russian-linked cybercriminals have introduced an advanced malware loader, dubbed CountLoader, in a series of phishing attacks against Ukrainian targets.

Delivered via a fake Ukrainian police PDF lure, CountLoader is available in three flavors: .NET, PowerShell, and JScript, each exhibiting sophisticated persistence and payload delivery mechanisms.

Silent Push Threat Analysts attribute deployment of Cobalt Strike

Sponsored
and AdaptixC2 beacon payloads to LockBit, BlackBasta, and Qilin affiliates, underscoring CountLoader’s integration into modern ransomware toolkits.
Screenshot of translated PDF (purportedly) originating from the National Police of Ukraine

Weaponized PDF Lure and Initial Deployment

The latest campaign employed a ZIP archive  vymoha_na_yavku.zip containing a PDF purportedly issued by Ukraine’s National Police.

When users open the document, an embedded script invokes mshta.exe to fetch the JScript-based CountLoader from a cluster of domains, including ms-team-ping[.]com

Checking a .zip file on VirusTotal confirmed its relation to the malicious CountLoader domains cluster

CountLoader’s robust fingerprinting combines proprietary HHV and SSL.CHV hashes with JARM TLS indicators enable it to evade traditional detection by retrying connections to a rotating list of up to ten C2 domains until successful authentication via an XOR-encrypted, Base64-encoded “success” message.

Upon initial execution, CountLoader collects system and domain metadata, generating a GUID-style victim identifier from user names, processor IDs, and disk serial numbers.

It then schedules a persistent task named “GoogleUpdaterTaskSystem135.0.7023.0<vFlawedGUID>,” impersonating Chrome’s update service to launch mshta with a /start parameter after ten minutes.

Registry modifications to MaxScriptStatements and a Run key entry (OneDriver) ensure repeated C2 polling and stage downloads from the victim’s Music folder.

Modular Payload Delivery and Ransomware Linkages

CountLoader’s loader loop authenticates to /connect and retrieves a C2 password, then posts periodic getUpdates requests. Returned tasks specify an ID, URL, and taskType, dictating execution via WMI, RunDLL32, msiexec, or direct process creation.

Sponsored

Notably, domain-joined machines also receive a taskType 5 query to enumerate domain groups, reflecting an emphasis on enterprise compromise.

The second sample was configured with the C2 domain

Analysis of two Cobalt Strike beacon payloads yielded watermark 1473793097, linked to both Qilin and BlackBasta incidents. One sample, observed June 20, 2025, communicated with quasuar[.]com (45.61.150.76), while another, dated August 29, 2024, used CloudFront fronting.

Shared SSL fingerprints between these and misctoolsupdate[.]com (180.131.145.73) further corroborate a unified infrastructure. AdaptixC2 implants (SHA-256 EA4108… and B86ADC…) were also deployed, alongside PureHVNC and Lumma Stealer binaries on non-domain hosts.

A .NET variant (twitter1.exe, SHA-256 17bfe3…) mirrors JScript logic but supports only ZIP and EXE tasks, and features a May 12, 2025, kill-switch that crashes the binary post-expiry.

PowerShell CountLoader (20 lines) replicates core C2 loops and in-memory execution, as previously documented by Kaspersky.

Organizations facing Russian threat actors and ransomware affiliates should incorporate Silent Push’s Indicators Of Future Attack (IOFA) feeds for CountLoader into their security stacks and audit scheduled tasks, run keys, and unusual HTA executions to detect and disrupt this evolving loader framework.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post New CountLoader Malware Uses Weaponized PDF to Deliver Ransomware appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

A First Look at the Universe of Futuristic MMORPG Prism 2033

The year is 2033, and a devastating virus and rogue AI have combined to bring…

2 hours ago

A First Look at the Universe of Futuristic MMORPG Prism 2033

The year is 2033, and a devastating virus and rogue AI have combined to bring…

2 hours ago

The 7th Tie in Oscars History Just Happened for Best Live Action Short Film

The Oscars just had their seventh tie in the history of the Academy Awards, for…

3 hours ago

Bans on sugary foods in SNAP programs in 5 states challenged by recipients

A sign explaining restrictions on buying soda and sweetened drinks using Supplemental Nutrition Assistance Program…

5 hours ago

Oscars Winners 2026: The Full List of Winners From the 98th Academy Awards (Live Updates!)

The 98th Academy Awards, also known as The Oscars 2026, have finally arrived and are…

6 hours ago

Big Country Trails & Tales: A look at Texas’ newest state park

BIG COUNTRY, Texas (KTAB/KRBC) - A brand new Texas State Park is now open, and…

6 hours ago

This website uses cookies.