Sunday, April 13, 2025
Homecyber securityAresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo

AresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo

Published on

SIEM as a Service

Follow Us on Google News

Cyble Research and Intelligence Labs (CRIL) has recently detected AresLoader, a novel loader that is found to be disseminating numerous malware families.

Malware loaders are designed to deploy and execute diverse malware strains on the targeted computer system of the victim.

To evade detection by antivirus software, loaders often employ various tactics such as encryption or obfuscation of the malicious payload, rendering it harder to detect by security measures.

- Advertisement - Google News

AresLoader

In 2022, AresLoader, a loader malware coded in the C programming language, emerged for the first time.

It has been identified that this loader was distributed through Telegram channels and malicious forums.

AresLoader, developed by the same threat actors behind the AiD Locker ransomware and distributed as Malware-as-a-Service (MaaS).

There is a monthly fee of $300 for AresLoader, which includes five build images.

There is also suspicion that the members of this group have ties with a hacktivist group based in Russia.

Technical Analysis

The notorious AresLoader follows a complex modus operandi. The initial loader binary serves as a container for the embedded code that is further injected in multiple stages, resulting in a complex chain of malicious activities.

During further analysis, it was noticed that the methods of extraction and injection of the loader code in each binary are inconsistent throughout the entire code.

By constantly updating their infection techniques, the threat actors evade the security measures implemented by the AV tools, and not only that even, there have also been multiple malware strains that have been observed to be using this loader.

Apart from this, CRIL discovered a GitLab repository distributing the AresLoader malware that is located at:-

  • hxxps[:]//gitlab.com/citrixchat-project/citrixproject/

While it has been detected that threat actors are actively targeting Citrix users with this repository masquerading as “citrixproject.”

During the execution of AresLoader, the malware utilizes a 32-bit binary compiled in C, which invokes the CreateWindowEx() API using the following elements:-

  • GLSample (Class name)
  • OpenGL Sample (Window name)

This distinct characteristic is one of the many ways cybersecurity experts identify and track the loader.

In an attempt to complicate the detection and analysis of this malware, API hashing is employed, and here the APIs that are targeted belong to:- 

  • ntdll.dll

Following is a list of API functions that the loader retrieves:-

  • pLdrFindResource_U
  • pLdrAccessResource
  • pNtAllocateVirtualMemory
  • pNtQueueApcThread
  • pNtTestAlert

Decrypting the resource data obtained earlier is the next step in the process, and then from the .rdata section, a key is acquired to accomplish this complete process.

The decryption loop begins immediately after the memory has been allocated, and the temporarily allocated memory is used to store the newly decrypted PE file.

Moreover, using a POST request, AresLoader registers the victim with the C&C server using additional information obtained from the victim’s system.

Recommendations

Here below, we have mentioned all the recommendations offered by the security experts:-

  • Do not download files from unknown websites. 
  • Ensure that a reputable antivirus and internet security software package protects your connected devices, such as your PC, laptop, and mobile phone. 
  • Ensure you verify the authenticity of all links and attachments in an email before opening them. 
  • Protect employees from threats such as phishing and untrusted URLs by educating them about the risks. 
  • The beacon should be monitored at the network level to prevent data exfiltration by malware or attackers.
  • Ensure that employee systems are protected by a Data Loss Prevention (DLP) solution.

Building Your Malware Defense Strategy – Download Free E-Book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...