The Evolution of Malware Loaders: From Single Payloads to Bundled Attacks

Summary:

A recent malware campaign highlights a shift toward multi-payload attack strategies, combining adware with a powerful remote access trojan such as Gh0st RAT. This approach enables attackers to achieve both short-term monetization and long-term system compromise while reducing detection risk.

The campaign leverages obfuscated loaders, covert persistence mechanisms, and advanced evasion techniques, including DNS manipulation, registry abuse, and misuse of legitimate system utilities. These capabilities allow attackers to maintain control over compromised systems while performing credential theft, network discovery, and surveillance. The evolution toward bundled malware delivery underscores the need for behaviour-driven detection and proactive threat hunting.

Technical Description:

The campaign uses an obfuscated loader to deliver two encrypted payloads: adware (CloverPlus) and the Gh0st RAT client DLL. The loader decrypts and executes the RAT via rundll32.exe from a randomly generated directory to evade signature-based detection.

Once executed, Gh0st RAT establishes persistence through registry run keys and Windows services, including misuse of the RemoteAccess service. It elevates privileges by enabling SeDebugPrivilege, allowing interaction with system-level processes.

The malware performs system and network reconnaissance by collecting user information, MAC addresses, and disk identifiers. It also incorporates anti-analysis techniques such as virtual machine detection, process termination, and artifact removal.

Network manipulation is a key capability, with the malware altering DNS behavior by spoofing responses, modifying the hosts file, and flushing DNS cache to block access to security-related domains. It retrieves command-and-control infrastructure using a dead drop resolver technique and supports delayed execution via ping-based sleep. Additional functionality includes remote command execution and targeted keylogging of Remote Desktop sessions, enabling credential theft and lateral movement. The details and technicalities of the attack campaign are discussed further,

Delivery and Infection Chain:

The campaign is delivered through an obfuscated loader, typically distributed via bundled software downloads, malicious advertisements, or phishing attachments. The loader conceals multiple encrypted payloads, allowing it to bypass initial detection.

The Infection chain was identified as follows,

  • A user executes an obfuscated loader delivered through bundled software or malicious downloads
  • The loader verifies execution paths, copies itself to a less-monitored directory, and deploys adware (CloverPlus) as an initial payload
  • A second-stage DLL containing Gh0st RAT is decrypted and stored with a randomized name to evade detection
  • The malicious DLL is executed via rundll32.exe, establishing persistence through registry keys and Windows services
  • The malware initiates command-and-control communication, performs reconnaissance, manipulates DNS, and begins credential theft and monitoring

Technical Capabilities:

The malware demonstrates extensive capabilities focused on persistence, stealth, and control. Privilege escalation is achieved through SeDebugPrivilege, enabling deep system interaction and data extraction. Persistence mechanisms include registry modifications and service creation, ensuring continued execution across reboots.

The malware conducts detailed reconnaissance, collecting system and network identifiers to profile infected hosts. Anti-analysis features such as virtual environment detection and process termination reduce the likelihood of detection.

DNS manipulation plays a central role, with the malware intercepting and altering domain resolution to block access to security services and maintain control. The use of a dead drop resolver adds layer of obfuscation by retrieving command-and-control details from seemingly legitimate sources.

Keylogging capabilities, particularly targeting Remote Desktop sessions, enable attackers to capture credentials and facilitate lateral movement. Combined with delayed execution techniques, these capabilities ensure long-term persistence and operational stealth.

Attribution and Evolution:

Ghost RAT has historically been associated with cyber espionage and cybercrime operations. This campaign demonstrates its continued evolution by integrating with modern, multi-payload delivery frameworks.

The inclusion of adware alongside a high-impact RAT reflects a hybrid monetization strategy in which attackers combine immediate financial gain with sustained access. This highlights how legacy malware families remain relevant by adapting to evolving threat landscapes.

Active Campaign and Geographic Spread:

The campaign appears to be opportunistic and widely distributed rather than targeted. It impacts a broad range of users and organizations globally through common infection vectors such as software downloads and online advertisements.

The use of public web services for command-and-control resolution enables flexible and geographically distributed operations, increasing the campaign’s reach and resilience.

Conclusion:

This campaign demonstrates the increasing sophistication of malware delivery strategies, where multiple payloads are combined to maximize effectiveness while minimizing detection. The integration of stealth, persistence, and modular functionality allows attackers to maintain prolonged access within compromised environments.

Organizations must adopt layered security strategies that emphasize behavioural monitoring, proactive threat hunting, and continuous visibility to effectively defend against such evolving threats.

Impact:

The impact of this campaign is significant, ranging from system compromise through Gh0st RAT to degraded user experience caused by adware. Attackers can steal credentials, maintain persistent access, exfiltrate sensitive data, and move laterally across networks.

DNS manipulation further increases risk by blocking access to security updates and protective services. If undetected, the campaign can lead to long-term unauthorized access, operational disruption, and data breaches.

IOC and Context Details:

Topics Details
Tactic Name Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Command and Control
Technique Name Command and Scripting Interpreter, Registry Run Keys/Startup Folder, Create or Modify System Process, Access Token Manipulation, Indicator Removal, Remote System Discovery, Application Layer Protocol
Sub Technique Name rundll32 Execution, Registry Run Keys, Windows Service, File Deletion, Dead Drop Resolver, Keylogging
Attack Type Malware
Targeted Applications Windows OS components, Remote Desktop, DNS services, Windows Registry, Remote Access service
Region Impacted Global
Industry Impacted Cross-industry
IOC’s SHA-256 Hash:
fda9864b1aa230b60d0c736559415ac9c79e240cce411daed5da2facb9ced87c
ebba8f4342b65faccdd2a48be9f2654d3fa523360f17ff68d5498a453f76c205
CVE NA

Recommended Actions:

  • Implement behavior-based detection and threat hunting to identify anomalies such as suspicious rundll32.exe execution and DNS manipulation
  • Restrict execution from high-risk directories and enforce application control policies
  • Monitor registry changes and service configurations for unauthorized persistence mechanisms
  • Deploy endpoint detection and response solutions with deep visibility into process behavior
  • Strengthen DNS security monitoring to detect spoofing and unauthorized modifications
  • Secure and restrict Remote Desktop access using multi-factor authentication and network controls
  • Ensure systems and security tools are regularly updated and protected from tampering
  • Conduct user awareness training to reduce risks from malicious downloads, ads, and phishing.

Reference:

https://www.splunk.com/en_us/blog/security/detecting-ghost-rat-cloverplus-adware-loader-analysis.html