Categories: Cyber Security News

Gootloader Malware Maintains Low Detection Rate While Bypassing Most Security Tools

New Gootloader analysis reveals sophisticated anti-detection mechanisms embedded in deliberately malformed ZIP archives, designed to evade automated security analysis while remaining accessible to intended victims via Windows’ default extraction tools.

The Gootloader threat actor has long served as an initial access broker in ransomware operations, establishing footholds within target systems before transferring control to secondary operators.

According to Huntress research, the current campaign involves collaboration with Vanilla Tempest, a threat group actively deploying Rhysida ransomware.

Historical data indicates Gootloader malware previously constituted eleven percent of all malware observed bypassing enterprise security solutions, demonstrating consistent effectiveness in evading detection mechanisms.

Malformed ZIP Archive Delivery Mechanism

The initial infection vector relies on weaponized ZIP archives containing malicious JScript files designed to initiate compromise sequences.

These archives exhibit deliberately malformed structures that prevent analysis by standard extraction utilities, including 7-Zip and WinRAR, while maintaining compatibility with Windows’ native unarchiving functionality.

Zip archive containing the “indiana_animal_protection_laws_guide. Js” jscript file. (source: expel)

This selective compatibility ensures target victims can successfully extract and execute payloads while hindering automated malware analysis workflows.

Technical examination reveals that each Gootloader ZIP archive consists of between 500 and 1,000 concatenated ZIP structures, with the End of Central Directory structure directing extraction tools to the valid compressed content.

The archives demonstrate intentional corruption through truncated End of Central Directory records that lack two critical bytes, in violation of the expected file format specifications.

Additionally, metadata fields including version numbers, modification timestamps, CRC32 checksums, and file size indicators contain randomized values that mismatch between local file headers and central directory records, causing parsing failures in specialized analysis tools.

Malcat analysis of file highlighting the mismatches between the local file header and central directories. (source: expel)

Forensic analysis identified that users receive XOR-encoded data blobs that are decoded by web browsers during downloads, which are then appended to form identical ZIP structures until reaching predetermined file sizes.

This client-side generation technique prevents network-based detection of malformed archives during transit while delivering hundreds of concatenated ZIP structures to victim systems.

Sponsored

The resulting files range from seventy to eighty megabytes despite containing single JScript payloads measuring approximately two hundred eighty-seven kilobytes when extracted.

When victims extract and execute JScript files from downloaded archives, Windows Script Host processes the malicious code from temporary directories in the AppDataLocalTemp folder.

The JScript establishes persistence by creating LNK shortcut files within Windows Startup folders that reference secondary scripts stored in randomly selected directories.

The observed activity by Expel, shows that secondary scripts use NTFS short filename conventions dating back to Windows NT legacy compatibility features, executed via CScript with obfuscated commands that spawn PowerShell processes.

The PowerShell execution chain involves heavily obfuscated commands that launch additional PowerShell instances to establish command-and-control communications.

Detection opportunities exist throughout this execution sequence, particularly monitoring for WScript processes executing JScript from temporary directories, CScript invoking scripts via NTFS shortnames, and abnormal process genealogy patterns where CScript spawns PowerShell child processes.

Resulting from execution of cscript executing the jscript file. (source: expel)

Security teams should implement Group Policy Objects reassociating JScript file extensions to open with Notepad rather than Windows Script Host, preventing automatic execution when users double-click malicious scripts.

Organizations can deploy YARA rules that detect the unique characteristics of Gootloader ZIP archives, including excessive occurrences of local file headers and End of Central Directory structures exceeding 100 instances per file.

Indicators of Compromise

Indicator Type Value Description
File Hash (SHA256) b05eb7a367b5b86f8527af7b14e97b311580a8ff73f27eaa1fb793abb902dc6e Malformed ZIP archive sample
File Extension .js, .jse Malicious JScript payload extensions
File Location C:Users[username]AppDataLocalTemp WScript execution from temporary directories
Persistence Path C:Users[username]AppDataRoamingMicrosoftWindowsStart MenuProgramsStartup LNK file creation location
Process Pattern wscript.exe → [temp path].js Initial execution from ZIP archive
Process Pattern cscript.exe → FILENA~1.js → powershell.exe NTFS shortname execution chain
Archive Characteristic 500-1000 concatenated ZIP structures File format anomaly indicator
Archive Size Range 76-80 MB Malformed ZIP file size despite small payload
Payload Size ~287 KB Actual JScript file size when extracted
Detection Signature PKx03x04 pattern occurring >100 times Local file header repetition
Detection Signature PKx05x06 pattern occurring >100 times End of Central Directory repetition
Malware Family Gootloader Initial access malware loader
Associated Threat Actor Vanilla Tempest Collaborating ransomware operator
Associated Ransomware Rhysida Secondary payload deployment
Campaign Start Date November 2025 Current operation timeline

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Gootloader Malware Maintains Low Detection Rate While Bypassing Most Security Tools appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Windows 11 23H2 to 25H2 Upgrade Allegedly Breaking Internet Connectivity

A persistent bug in Windows 11 in-place upgrades is reportedly wiping critical 802.1X wired authentication…

2 hours ago

Coruna Exploit Kit With 23 Exploits Hacked Thousands of iPhones

Google’s Threat Intelligence Group (GTIG) has uncovered Coruna, a sophisticated iOS exploit kit containing 23…

2 hours ago

Roy Cooper, Michael Whatley secure US Senate nominations, setting up fierce November election

Former state and national GOP Chair Michael Whatley (left) and former Gov. Roy Cooper are…

2 hours ago

Tillis, more Republicans unload on Noem over Minneapolis operation, FEMA delays

U.S. Sen. Thom Tillis, Republican of North Carolina, speaks as Homeland Security Secretary Kristi Noem…

2 hours ago

Diana Fenton withdraws as nominee for child advocate after questions arise over independence, conflicts of interest

Diana Fenton has withdrawn her name from consideration to be New Hampshire’s next child advocate…

2 hours ago

Byron family shares son’s journey with Severe Hemophilia A

A family in Byron is sharing the story of their 1-year-old son, J.J. Larson and…

2 hours ago

This website uses cookies.