New CountLoader Malware Uses Weaponized PDF to Deliver Ransomware
Delivered via a fake Ukrainian police PDF lure, CountLoader is available in three flavors: .NET, PowerShell, and JScript, each exhibiting sophisticated persistence and payload delivery mechanisms.
Silent Push Threat Analysts attribute deployment of Cobalt Strike
The latest campaign employed a ZIP archive vymoha_na_yavku.zip containing a PDF purportedly issued by Ukraine’s National Police.
When users open the document, an embedded script invokes mshta.exe to fetch the JScript-based CountLoader from a cluster of domains, including ms-team-ping[.]com
CountLoader’s robust fingerprinting combines proprietary HHV and SSL.CHV hashes with JARM TLS indicators enable it to evade traditional detection by retrying connections to a rotating list of up to ten C2 domains until successful authentication via an XOR-encrypted, Base64-encoded “success” message.
Upon initial execution, CountLoader collects system and domain metadata, generating a GUID-style victim identifier from user names, processor IDs, and disk serial numbers.
It then schedules a persistent task named “GoogleUpdaterTaskSystem135.0.7023.0<vFlawedGUID>,” impersonating Chrome’s update service to launch mshta with a /start parameter after ten minutes.
Registry modifications to MaxScriptStatements and a Run key entry (OneDriver) ensure repeated C2 polling and stage downloads from the victim’s Music folder.
CountLoader’s loader loop authenticates to /connect and retrieves a C2 password, then posts periodic getUpdates requests. Returned tasks specify an ID, URL, and taskType, dictating execution via WMI, RunDLL32, msiexec, or direct process creation.
Notably, domain-joined machines also receive a taskType 5 query to enumerate domain groups, reflecting an emphasis on enterprise compromise.
Analysis of two Cobalt Strike beacon payloads yielded watermark 1473793097, linked to both Qilin and BlackBasta incidents. One sample, observed June 20, 2025, communicated with quasuar[.]com (45.61.150.76), while another, dated August 29, 2024, used CloudFront fronting.
Shared SSL fingerprints between these and misctoolsupdate[.]com (180.131.145.73) further corroborate a unified infrastructure. AdaptixC2 implants (SHA-256 EA4108… and B86ADC…) were also deployed, alongside PureHVNC and Lumma Stealer binaries on non-domain hosts.
A .NET variant (twitter1.exe, SHA-256 17bfe3…) mirrors JScript logic but supports only ZIP and EXE tasks, and features a May 12, 2025, kill-switch that crashes the binary post-expiry.
PowerShell CountLoader (20 lines) replicates core C2 loops and in-memory execution, as previously documented by Kaspersky.
Organizations facing Russian threat actors and ransomware affiliates should incorporate Silent Push’s Indicators Of Future Attack (IOFA) feeds for CountLoader into their security stacks and audit scheduled tasks, run keys, and unusual HTA executions to detect and disrupt this evolving loader framework.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post New CountLoader Malware Uses Weaponized PDF to Deliver Ransomware appeared first on Cyber Security News.
The year is 2033, and a devastating virus and rogue AI have combined to bring…
The year is 2033, and a devastating virus and rogue AI have combined to bring…
The Oscars just had their seventh tie in the history of the Academy Awards, for…
A sign explaining restrictions on buying soda and sweetened drinks using Supplemental Nutrition Assistance Program…
The 98th Academy Awards, also known as The Oscars 2026, have finally arrived and are…
BIG COUNTRY, Texas (KTAB/KRBC) - A brand new Texas State Park is now open, and…
This website uses cookies.