In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies of decoding its payloads and obfuscations.
Equipped with hands-on scripts and tools, we aim to guide cybersecurity enthusiasts and professionals through the maze of GootLoader. Get ready for an informative journey.
GootLoaderAutoJsDecode.py
– automatically decodes .js
files using static analysis (recommended)GootLoaderAutoJsDecode-Dynamic.py
– automatically decodes .js
files using dynamic analysisGootLoaderManualJsDecode-Dynamic.py
– used to manually decode .js
files using dynamic analysisGootloaderRegDecode.py
– automatically decodes reg payload exportsGootloaderWindowsRegDecode.ps1
– Directly decodes a payload from the registry.Run the script GootLoaderAutoJsDecode.py
against the .js
file.
python GootLoaderAutoJsDecode.py "evil.js"
The script will output the files below:
FileAndTaskData.txt
– Contains the names of the scheduled task and dropped files.DecodedJsPayload.js_
– The decoded payload that runs a PowerShell command. You can use a CyberChef’s Generic Code Beautify
in order to make the content easier to read.If the GootLoaderAutoJsDecode.py
script stops working then you can attempt to use the dynamic version of the script (GootLoaderAutoJsDecode-Dynamic.py
). Be aware that the dynamic script executes part of the GOOTLADER code, as a result it should only be run in an isolated environment.
Sometimes the GOOTLOADER js
obfuscation changes and the GootLoaderAutoJsDecode.py
script stops working. In those instances, follow the instructions found at ManualDecoding.md.
Gootloader Obfuscation Variant 2:
82607b68e061abb1d94f33a2e06b0d20
961cd55b17485bfc8b17881d4a643ad8
af9b021a1e339841cfdf65596408862d
d3787939a5681cb6d6ac7c42cd9250b5
Gootloader Obfuscation Variant 3:
ea2271179e75b652cafd8648b698c6f9
c07b581fde56071e05754eef450dfa17
Agent Events\Registry Key Events
value change
HKEY_USERS\<USER_SID>\SOFTWARE\Microsoft\Phone\%USERNAME%
...\Phone\UserName\...
and one called ...\Phone\UserName0\...
.Text Data
field.python GootloaderRegDecode.py "regExport.csv"
3. The script should generate 2 files payload1.dll_
and payload2.exe_
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…