SquidLoader Deploys Stealthy Malware with Near-Zero Detection to Evade Security Measures
A fresh variant of SquidLoader malware has surfaced, actively entering Hong Kong institutions with previously unheard-of stealth, which is alarming for the financial industry.
This sophisticated loader achieves near-zero detection rates on platforms like VirusTotal, leveraging intricate anti-analysis, anti-sandbox, and anti-debugging mechanisms to deploy Cobalt Strike Beacons for remote access.
The malware’s attack chain begins with spear-phishing emails in Mandarin, disguised as legitimate financial correspondence, containing password-protected RAR archives that extract a PE binary masquerading as a Microsoft Word document or the benign AMDRSServ.exe.
Upon execution, SquidLoader relocates itself to C:UsersPublicsetup_xitgutx.exe, hijacking the __scrt_common_main_seh function in the CRT prologue to initiate malicious operations before reaching WinMain, effectively bypassing initial inspections.
Advanced Evasion Tactics
Technical dissection reveals a multi-stage infection process. The initial unpacking stage employs a simple yet effective loop to de-obfuscate packed bytes via XOR with 0xF4 followed by adding 19, unveiling subsequent payloads.
Stage two involves PEB walking to dynamically resolve APIs from ntdll.dll and kernel32.dll, with API names XORed and overwritten to erase static traces.
A custom stack structure stores resolved pointers, flags, and PEB/TEB addresses, saved in an unused PEB section for easy access, while heavy control flow obfuscation via conditional jumps complicates reverse engineering.
Stage three ramps up evasion with anti-sandbox checks, such as verifying usernames against “Abby” or “WALKER,” and ensuring the process image matches the relocated path.
It enumerates processes via NtQuerySystemInformation to blacklist tools like OllyDbg (misspelled as Olldbg.exe), x64dbg.exe, IDA Pro, and antivirus processes including MsMpEng.exe for Windows Defender.
Undocumented syscalls like NtQueryInformationProcess (0x1e) detect debug objects, and NtQuerySystemInformation (0x23) flags kernel debuggers, triggering self-termination if anomalies arise.

A novel anti-emulation trick creates a long-sleeping thread (16 minutes via SleepEx), queues an APC with NtQueueApcThread to set a flag in its data structure, and uses NtWaitForSingleObject to verify execution; deviations, common in emulators or hooked sandboxes, cause termination.
Additional measures include NtIsProcessInJob for Microsoft emulator detection, dynamic string obfuscation, and a user-interaction-required Mandarin error message box (“The file is corrupted and cannot be opened”) to foil automated analysis.
C2 Integration
Post-evasion, SquidLoader contacts its C2 server at endpoints like hxxps://39.107.156.136/api/v1/namespaces/kube-system/services, mimicking Kubernetes traffic to blend in.
It transmits host details IP, username, OS version, PID, admin status before downloading and executing Cobalt Strike Beacon shellcode in memory, connecting to secondary C2s such as 182.92.239.24 for persistence.
Similar low-detection samples target Singapore, China, and Australia, sharing Kubernetes-themed URLs, indicating a coordinated campaign with geographic adaptations.
Phishing emails, dated March 31, 2025, pose as bond registration forms with encrypted attachments (password: 20250331), underscoring social engineering’s role.
This malware’s sparse detections and advanced techniques pose severe risks, urging financial entities to monitor for IOCs and enhance behavioral defenses.
Indicators of Compromise (IOCs)
Category | Details |
---|---|
Hashes (SHA256) | Hong Kong: bb0f370e11302ca2d7f01d64f0f45fbce4bac6fd5613d8d48df29a83d382d232 b2811b3074eff16ec74afbeb675c85a9ec1f0befdbef8d541ac45640cacc0900 6960c76b624b2ed9fc21546af98e1fa2169cd350f37f6ca85684127e9e74d89c 9dae4e219880f0e4de5bcba649fd0741e409c8a56b4f5bef059cdf3903b78ac2 Singapore: 34d602d9674f26fa2a141c688f305da0eea2979969f42379265ee18589751493 China: a244bfcd82d4bc2de30fc1d58750875b638d8632adb11fe491de6289ff30d8e5 Australia: 2d371709a613ff8ec43f26270a29f14a0cb7191c84f67d49c81d0e044344cf6c |
C2 Servers | hxxps://39.107.156.136/api/v1/namespaces/kube-system/services hxxps://8.140.62.166/api/v1/namespaces/kube-system/services hxxps://38.55.194.34/api/v1/namespaces/kube-system/services hxxps://47.116.178.227/api/v1/namespaces/kube-system/services hxxps://121.41.14.96/api/v1/namespaces/kube-system/services hxxps://47.116.178.227:443/api/v1/namespaces/kube-system/services |
Network Signature | HTTPS requests to C2 with URI /api/v1/namespaces/kube-system/services; User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko |
VirusTotal Query | vt-query:”https://www.virustotal.com/gui/search/type%253Apeexe%2520and%2520%2522%252Fapi%252Fv1%252Fnamespaces%252Fkube-system%252Fservices%2522?type=files” |
Stay Updated on Daily Cybersecurity News. Follow us on Google News, LinkedIn, and X.
Source link