December 5, 2018 By David Bisson 2 min read

Security researchers identified a malspam campaign targeting Italian users with a variant of the sLoad downloader.

In October and November, CERT-Yoroi detected a series of malicious email messages that shared common techniques. Each malicious sample arrived as a compressed ZIP archive containing two files: an LNK file pretending to point to a system folder and a hidden JPEG image stored with HA attributes.

When a user clicks on the link, the file uses a batch script to run a PowerShell script, which searches for another ZIP file. If it exists, the PowerShell script extracts code from that file and uses it to download other scripts. Among those other scripts are “NxPgKLnYEhMjXT.ps1,” which installs the sLoad implant on the victim’s machine.

Successful execution enables sLoad to collect information about the infected computer and periodically capture screenshots, among other functionality. It then sends this data to attackers via command and control (C&C) channels before receiving additional PowerShell code, behavior that is characteristic of Trojans and spyware.

sLoad: The Latest PowerShell-Borne Threat

This isn’t the first time that security researchers have detected attacks utilizing sLoad. In May 2018, the SANS Internet Storm Center (ISC) identified a PowerShell script targeting customers of major U.K. banks. Further analysis tied this activity to hxxps://cflfuppn[.]eu/sload/run-first.ps1.

Together, these campaigns targeting Italian and U.K. users represent the latest activity of just one threat delivered by PowerShell scripts. IBM X-Force Incident Response and Intelligence Services (IRIS) observed an increase in PowerShell attacks between 2017 and 2018. This finding coincides with Symantec’s detection of a 661 percent increase in the number of computers registering blocked PowerShell activity between mid-2017 and mid-2018.

How Security Professionals Can Block a Malspam Campaign

Security professionals can help defend their organizations against malspam campaigns by investing in awareness training that instructs employees to avoid suspicious links and email attachments. IBM X-Force IRIS also recommends using physical security controls to block the abuse of PowerShell scripts, and integrating security information and event management (SIEM) and endpoint detection and response (EDR) tools to provide an additional layer of protection.

Sources: Yoroi, SANS ISC, Symantec

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today