GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得通读一下这篇文章,了解主要内容。 文章讲的是一个叫做GootLoader的JavaScript恶意软件加载器。它使用了一种特殊的ZIP档案来逃避检测。这些ZIP档案是通过拼接500到1000个档案制成的,这样很多解压工具就无法正常解压,但Windows自带的解压工具却能处理。这样一来,受害者在点击下载后,就会运行恶意软件。 GootLoader通常通过SEO中毒或恶意广告传播,目标是寻找法律模板的用户。它会将他们引导到托管恶意ZIP档案的WordPress网站。这个恶意软件还能分发其他恶意负载,比如勒索软件。 最近的攻击还用了自定义的WOFF2字体和WordPress评论端点来分发ZIP文件。此外,攻击者还使用了“hashbusting”技术,让每个下载的ZIP文件都是唯一的,从而绕过检测机制。 防御建议包括阻止wscript.exe和cscript.exe执行下载的内容,并使用GPO设置让JavaScript文件默认用记事本打开。 总结一下,我需要把重点放在GootLoader如何利用复杂的ZIP档案和多种技术逃避检测,并传播恶意软件上。同时要提到防御措施。 </think> GootLoader是一种通过复杂ZIP档案传播的JavaScript恶意软件加载器,利用拼接500-1,000个档案、截断关键字节等技术逃避检测,并通过Windows默认解压工具运行payload。该恶意软件常通过SEO中毒或malvertising传播至WordPress站点,并可分发勒索软件等二次负载。最新攻击还利用WOFF2字体和WordPress评论端点分发payload,并采用随机化技术生成唯一ZIP文件以规避检测。 2026-1-16 17:59:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Malvertising / Threat Intelligence

The JavaScript (aka JScript) malware loader called GootLoader has been observed using a malformed ZIP archive that's designed to sidestep detection efforts by concatenating anywhere from 500 to 1,000 archives.

"The actor creates a malformed archive as an anti-analysis technique," Expel security researcher Aaron Walton said in a report shared with The Hacker News. "That is, many unarchiving tools are not able to consistently extract it, but one critical unarchiving tool seems to work consistently and reliably: the default tool built into Windows systems."

This leads to a scenario where the archive cannot be processed by tools like WinRAR or 7-Zip, and, therefore, prevents many automated workflows from analyzing the contents of the file. At the same time, it can be opened by the default Windows unarchiver, thereby ensuring that victims who fall victim to the social engineering scheme can extract and run the JavaScript malware.

GootLoader is typically distributed via search engine optimization (SEO) poisoning tactics or malvertising, targeting users looking for legal templates to take them to compromised WordPress sites hosting malicious ZIP archives. Like other loaders, it's designed to deliver secondary payloads, including ransomware. The malware has been detected in the wild since at least 2020.

Cybersecurity

In late October 2025, malware campaigns propagating the malware resurfaced with new tricks: leveraging custom WOFF2 fonts with glyph substitution to obfuscate filenames and exploiting the WordPress comment endpoint ("/wp-comments-post.php") to deliver the ZIP payloads when a user clicks a "Download" button on the site.

The latest findings from Expel highlight continued evolution of the delivery methods, with the threat actors employing more sophisticated obfuscation mechanisms to evade detection -

  • Concatenate together 500-1,000 archives to craft the malicious ZIP file
  • Truncate the archive's end of central directory (EOCD) record such that it misses two critical bytes from the expected structure, triggering parsing errors
  • Randomize values in non-critical fields, such as disk number and Number of Disks, causing unarchiving tools to expect a sequence of ZIP archives that are non-existent

"The random number of files concatenated together, and the randomized values in specific fields are a defense-evasion technique called 'hashbusting,'" Walton explained.

"In practice, every user who downloads a ZIP file from GootLoader's infrastructure will receive a unique ZIP file, so looking for that hash in other environments is futile. The GootLoader developer uses hashbusting for the ZIP archive and for the JScript file contained in the archive."

The attack chain essentially involves the delivery of the ZIP archive as an XOR-encoded blob, which is decoded and repeatedly appended to itself on the client-side (i.e., on the victim's browser) until it meets a set size, effectively bypassing security controls designed to detect the transmission of a ZIP file.

Cybersecurity

As soon as the downloaded ZIP archive is double-clicked by the victim, it will cause Windows' default unarchiver to open the ZIP folder containing the JavaScript payload in File Explorer. Launching the JavaScript file, in turn, triggers its execution via "wscript.exe" from a temporary folder, since the file contents were not explicitly extracted.

The JavaScript malware then creates a Windows shortcut (LNK) file in the Startup folder to establish persistence, ultimately executing a second JavaScript file using cscript, spawning PowerShell commands to take the infection to the next stage. In previous GootLoader attacks, the PowerShell script is used to collect system information and receive commands from a remote server.

To counter the threat posed by GootLoader, organizations are advised to consider blocking "wscript.exe" and "cscript.exe" from executing downloaded content if not required and use a Group Policy Object (GPO) to ensure that JavaScript files are opened in Notepad by default, instead of executing them via "wscript.exe."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/gootloader-malware-uses-5001000.html
如有侵权请联系:admin#unsafe.sh