Friday, February 21, 2025
HomeCyber Security NewsHackers Exploit Jarsigner Tool to Deploy XLoader Malware

Hackers Exploit Jarsigner Tool to Deploy XLoader Malware

Published on

SIEM as a Service

Follow Us on Google News

Security researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a new campaign leveraging the legitimate JAR signing tool, jarsigner.exe, to distribute the XLoader malware.

The attack employs a DLL side-loading technique, where malicious DLL files are placed alongside legitimate executable files to ensure their execution when the legitimate application is run.

This method exploits the trust associated with legitimate software to bypass security defenses.

Malicious DLL Side-Loading Technique Identified

The jarsigner tool, a component of the Eclipse Foundation’s Integrated Development Environment (IDE) package, is typically used for signing Java Archive (JAR) files.

However, in this attack, it has been weaponized by bundling it with malicious files in a compressed archive.

The archive contains three key components: a legitimate executable file renamed as Documents2012.exe, and two malicious DLLs jli.dll and concrt140e.dll.

XLoader Malware
Comparison of export function lists: legitimate jli.dll vs. malicious jli.dll

Anatomy of the Attack

The malicious jli.dll serves as the primary enabler of the attack.

Unlike its legitimate counterpart, which contains distinct export functions, this tampered version maps all export functions to a single address, ensuring that any function call triggers the attacker’s code.

This DLL decrypts and injects the second malicious file, concrt140e.dll, into a legitimate process (aspnet_wp.exe), effectively deploying the XLoader malware.

XLoader is an advanced information-stealing malware capable of exfiltrating sensitive data such as browser credentials and system information.

According to ASEC, it can also download additional payloads, amplifying its threat potential.

The malicious files in this campaign lack valid digital signatures, unlike the legitimate components signed by the Eclipse Foundation, making them identifiable upon close inspection.

This attack highlights the dangers of DLL side-loading, where threat actors exploit trust in legitimate software to execute malicious code.

By distributing these files together in compressed archives, attackers aim to deceive users into executing them without suspicion.

To mitigate such threats, users and organizations are advised to:

  • Exercise caution when handling executable files bundled with DLLs from unverified sources.
  • Regularly update endpoint protection tools to detect unsigned or suspicious DLLs.
  • Monitor for anomalous behaviors in trusted applications that could indicate tampered components.

The MD5 hashes associated with this campaign (42f5b18d194314f43af6a31d05e96f16 and 8e6763e7922215556fa10711e1328e08) and suspicious URLs (e.g., http[:]//www[.]datarush[.]life/uhtg/) should be actively blocked in security systems.

As attackers continue refining their techniques, proactive measures remain critical to safeguarding systems against sophisticated threats like XLoader.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti Endpoint Manager Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti Endpoint Manager Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...