BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Gootkit Loader operators use VLC Media Player as a post-exploitation tool


    Trend Micro researchers warn that Gootkit Loader has targeted the Australian healthcare industry using SEO poisoning and VLC Media Player as Cobalt Strike.

    SEO poisoning techniques use keywords such as "hospital", "health", "medicine" and "corporate agreement" in combination with the names of Australian cities. When searching for terms related to the Australian healthcare industry, "poisoned" sites appear on the first page of search results. When you open the site, a forum page appears that contains a link to download the ZIP file containing the malware.

    The ZIP archive also contains a JavaScript file that is used for obfuscation and persistence through a scheduled task. The scheduled task runs a PowerShell script and retrieves the attack chain files from the C&C server.

    The second stage of infection occurs after the waiting time, which lasts from several hours to two days. When the timeout expires, the payloads are removed (msdtc.exe and libvlc.dll). "msdtc.exe" is a VLC Media Player installer that pretends to be a legitimate Windows component. Using the DLL Sideloading method, the installer loads the "libvlc.dll" library with the Cobalt Strike module, and then functions as Cobalt Strike itself.

    Author DeepWeb
    How does amphetamine affect the nervous system?
    Royal Mail cyberattack linked to LockBit ransomware operation

    Comments 0

    Add comment