Malware Loader — CountLoader Threat Analysis Report — By CyberDudeBivash Date: September 19, 2025
- Get link
- X
- Other Apps
Executive summary
CountLoader is a newly observed multi-version malware loader used to deliver post-exploitation tooling (Cobalt Strike, AdaptixC2) and remote access trojans (PureHVNC/PureRAT). It appears in at least three implementations — .NET, PowerShell, and JScript/HTMLA — and has been distributed in PDF/ZIP phishing lures (notably a campaign impersonating Ukrainian police). Public reporting ties CountLoader activity to Russian-language ransomware ecosystems (LockBit, BlackBasta, Qilin) or to Initial Access Broker activity used by those ecosystems. Silent Push+1
1 — Key findings (short)
-
Multi-version loader: .NET, PowerShell, JScript (HTML application) variants have been observed. Silent Push+1
-
Delivery vectors: weaponized PDFs/ZIPs and social-engineering lures (e.g., impersonating Ukrainian police or fake job offers / ClickFix pages). Silent Push+1
-
Post-drop payloads: Cobalt Strike, AdaptixC2, PureHVNC RAT (and other commodity malware/infostealers). The Hacker News+1
-
Infrastructure: >20 domains observed sharing a common “/api/getFile?fn=” path and other fingerprintable traits; sample domains:
app-updater[.]app
,app-updater1[.]app
,app-updater2[.]app
,ms-team-ping2[.]com
,grouptelecoms[.]com
, etc. Silent Push -
Techniques: use of LOLBins (certutil, bitsadmin, curl, msiexec, rundll32, PowerShell, MSXML/WinHTTP), scheduled task persistence (masquerading as Google/Chrome update), domain-based C2 retry logic (very high retry counts). The Hacker News+1
2 — Technical analysis
2.1 Variants & capabilities
-
JScript / HTA version (most feature-rich): Implements six download methods (curl, PowerShell, MSXML2.XMLHTTP, WinHTTP, bitsadmin, certutil), three execution methods, victim-environment enumeration (domain detection), uses Music folder for staging, and can download DLL/MSI payloads executed with
rundll32.exe
/msiexec.exe
. The Hacker News+1 -
PowerShell version: Previously observed by Kaspersky (earlier June 2025 reporting) and used with “DeepSeek”-style AI phishing decoys. It includes an encrypted/obfuscated command generator and abuse of LOLBins. Silent Push
-
.NET version: Functionally similar but reduced feature set (supports fewer UpdateType commands such as .zip and .exe). Silent Push
2.2 TTPs (high-value)
-
Initial access: Phishing with weaponized PDFs or social engineering (fake police notices, job offers, ClickFix). Silent Push+1
-
Execution & persistence: Execution via HTA, PowerShell; persistence via scheduled task faking Chrome/Google updater. The Hacker News
-
Lateral/tools: Downloads and stages Cobalt Strike, AdaptixC2, PureHVNC RAT; uses proxying/browser traffic manipulation capabilities (BrowserVenom style) in some payloads. The Hacker News
-
Evasion: Uses legitimate OS tools (certutil, bitsadmin, msiexec, rundll32), encrypted command strings, ubiquitous C2 retry loops to blend traffic and complicate takedown. Silent Push+1
3 — Indicators of Compromise (IOCs) — sample list
Domain / Host (sample extracted from public reporting; treat as TLP:AMBER — confirm with your telemetry):
app-updater[.]app
,app-updater1[.]app
,app-updater2[.]app
,ms-team-ping2[.]com
,grouptelecoms[.]com
,limenlinon[.]com
,misctoolsupdate[.]com
,officetoolservices[.]com
,onlinenetworkupdate[.]com
,quasuar[.]com
. Silent Push
Network patterns / HTTP path: Requests with
/api/getFile?fn=
used across multiple related domains (shared path fingerprint). Silent Push
Behavioral IOCs:
-
Creation of scheduled task named to resemble Google/Chrome update. The Hacker News
-
Staging in
%USERPROFILE%\Music\
folder or use of Music folder as staging ground. The Hacker News -
Use of certutil/bitsadmin/curl/msiexec/rundll32 for file retrieval and execution. The Hacker News
Payloads commonly observed: Cobalt Strike beacons, AdaptixC2 implants, PureHVNC RAT, and various infostealers (reported alongside loader domains). The Hacker News+1
Important: this is a non-exhaustive IOC set. CountLoader infrastructure is actively evolving — integrate these IOCs into blocklists and watchlists, but rely primarily on behavior detection and telemetry for coverage. Silent Push
4 — Detection & hunting recipes (practical)
4.1 High-priority EDR / SIEM hunts
-
Scheduled-task creation with updater-like names
SIEM/EDR query: detectCreateScheduledTask
events whereTaskName
containsupdate
,google
,chrome
,updater
, and parent process ismshta.exe
,wscript.exe
,cscript.exe
, orpowershell.exe
. (Tune to reduce false positives.) -
Unusual use of LOLBins for file download + execution
Detect processes invokingcertutil.exe
,bitsadmin.exe
,curl.exe
,msiexec.exe
,rundll32.exe
with network-download parameters shortly aftermshta
/wscript
/powershell
execution. -
HTTP(s) requests to /api/getFile?fn= across multiple domains
Network telemetry: flag internal hosts making HTTP GET requests to external domains with the path/api/getFile?fn=
or similar query string patterns. -
Files staged in Music folder
Endpoint monitoring for creation of new executables, DLLs, or MSI files inside%USERPROFILE%\Music\
(and subfolders), especially if followed byrundll32/msiexec
execution.
4.2 Sigma-style example (concept)
title: Suspicious Updater Task Followed by LOLBin Download
id: 8f3d5b2a-CountLoader-hunt
status: experimental
detection:
selection:
EventID: 4698 # Task created (Windows)
TaskName|contains|all:
- "update"
- "updater"
- "google"
- "chrome"
condition: selection
level: high
(Adapt for your SIEM and tune for noise.)
4.3 YARA (conceptual) hints
-
YARA for JScript/HTA variants: look for strings referencing multiple download methods (
MSXML2.XMLHTTP
,WinHttpRequest
,bitsadmin
,certutil
), orapi/getFile?fn=
literal. Avoid over-broad matching — use combined conditions.
Mitigations & remediation (actionable)
Immediate (0–24 hours)
-
Block known domains at perimeter/proxy/firewall: ingest the domain list above into DNS and web proxies (and mark for takedown requests where appropriate). Silent Push
-
Deploy/Escalate EDR rules to detect scheduled tasks created by
mshta/wscript/cscript/powershell
and block suspiciousmsiexec
/rundll32
child executions. The Hacker News -
Quarantine endpoints that show the
/api/getFile?fn=
pattern or downloads from the enumerated domains and collect full forensic artifacts (memory, disk image, network capture).
Short term (24–72 hours)
-
Hunt for secondary payloads: search telemetry for Cobalt Strike beacons (known C2 patterns), AdaptixC2 indicators, PureHVNC communications. The Hacker News
-
Reset/revoke credentials for any accounts suspected of compromise; rotate service credentials and MFA tokens where applicable.
Longer term / strategic
-
Block and monitor LOLBins usage via application control policies (allowlist legitimate usages, deny or alert for non-standard contexts). The Hacker News
-
Implement phishing resilience training that includes weaponized PDF awareness and detection of fake update lures. Silent Push
-
Tighten endpoint protections: enable application allowlisting, restrict
mshta
,wscript
,certutil
and bitsadmin usage to admin workflows only, and ensure EDR telemetry retention for retrospective hunts.
Attribution & assessment
-
Who benefits / likely operators: Silent Push (and corroborating sources) assess CountLoader is either an IAB toolkit or being used by ransomware affiliates linked to LockBit, BlackBasta, and Qilin families — i.e., the loader benefits Russian-language ransomware operations. Confidence: medium-high based on payload overlap (Cobalt Strike, AdaptixC2, PureHVNC) and targeting (Ukraine-themed lures). Silent Push+1
-
Operational risk: High for organizations with exposed employees in targeted geographies or those with lax endpoint controls; CountLoader’s multi-method download+execution and modular payload approach makes it a flexible initial access vector that can deliver a variety of post-exploitation tools. Silent Push+1
Recommended detection playbook (quick checklist)
-
Ingest the sample domain blocklist into DNS/proxy/URL filtering. Silent Push
-
Add SIEM rules for
/api/getFile?fn=
HTTP requests and scheduled task names imitating updaters. Silent Push+1 -
Hunt for files in
%USERPROFILE%\Music\
and for child processes ofmshta/wscript
spawningrundll32/msiexec
. The Hacker News -
Search for Cobalt Strike / Adaptix / PureHVNC indicators in network telemetry and EDR. The Hacker News
-
Revoke exposed credentials; notify affected business units and begin forensic triage if matches found.
Appendix — Sample IOC block
Domains:
app-updater[.]app
app-updater1[.]app
app-updater2[.]app
ms-team-ping2[.]com
grouptelecoms[.]com
limenlinon[.]com
misctoolsupdate[.]com
officetoolservices[.]com
onlinenetworkupdate[.]com
quasuar[.]com
HTTP path pattern:
*/api/getFile?fn=*
Detection hints:
Look for scheduled tasks with 'update' in name created by mshta/wscript/powershell.
Look for new executables placed under %USERPROFILE%\Music\ and immediate execution via rundll32/msiexec.
(Confirm and expand with your telemetry — IOCs are actively evolving.) Silent Push
Sources & further reading
-
Silent Push: CountLoader: Silent Push Discovers New Malware Loader Being Served in 3 Different Versions (detailed technical writeup, domain list, behavioral notes). Silent Push
-
The Hacker News: CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader (summary and context on payloads/attribution). The Hacker News
-
GBHackers / CybersecurityNews / SCWorld / CyberPress — contemporaneous reporting aggregating technical and IOC details. GBHackers+2Cyber Security News+2
Hashtags: #CyberDudeBivash #CountLoader #ThreatIntel #Ransomware #MalwareLoader #IOCs #CyberSecurity #ThreatHunting
- Get link
- X
- Other Apps
Comments
Post a Comment