Saturday, April 26, 2025
Homecyber securityAdvanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Published on

SIEM as a Service

Follow Us on Google News

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader, which emerged around September 2024.

This advanced loader employs numerous techniques to bypass security solutions and evade detection while delivering second-stage payloads, particularly the Rhadamanthys stealer.

CoffeeLoader utilizes a specialized packer named Armoury that leverages the GPU to execute code, hindering analysis in virtual environments.

- Advertisement - Google News

The malware implements call stack spoofing, sleep obfuscation, and Windows fibers to defeat endpoint security software.

Additionally, it uses a domain generation algorithm (DGA) as a backup communication channel and certificate pinning to prevent TLS man-in-the-middle attacks.

Rhadamanthys Stealer: A Potent Threat

The primary payload delivered by CoffeeLoader is the Rhadamanthys stealer, a C++ information-stealing malware that has been active since late 2022.

CoffeeLoader Malware
Example CoffeeLoader spoofed call stack trace for RtlRandomEx.

Rhadamanthys targets a wide range of sensitive data, including credentials from web browsers, VPN clients, email clients, chat applications, and cryptocurrency wallets.

Recent updates to Rhadamanthys have introduced AI-powered capabilities, such as optical character recognition (OCR) for extracting cryptocurrency wallet seed phrases from images.

According to the Report, this feature, known as “Seed Phrase Image Recognition,” significantly enhances the malware’s threat to cryptocurrency users.

Infection Chain and Distribution

CoffeeLoader has been observed being distributed via SmokeLoader, with both malware families sharing behavioral similarities.

Rhadamanthys, on the other hand, is primarily spread through malicious Google advertisements that mimic legitimate software platforms like AnyDesk, Zoom, Microsoft Teams, and Notepad++.

Zscaler Cloud Sandbox report for CoffeeLoader.

The infection chain typically consists of three components: the Dropper, the Rhadamanthys Loader (second shellcode), and the Rhadamanthys Stealer (Nsis module).

This layered approach allows the malware to maintain stealth and efficacy throughout the infection process.

As cybercriminals continue to evolve their tactics, the combination of CoffeeLoader’s advanced evasion techniques and Rhadamanthys’ powerful stealing capabilities presents a significant threat to organizations and individuals alike.

Security professionals must remain vigilant and implement robust defense mechanisms to protect against these sophisticated malware families.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

How to Develop a Strong Security Culture – Advice for CISOs and CSOs

Developing a strong security culture is one of the most critical responsibilities for today’s...

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...