Wednesday, May 14, 2025
HomeCyber Security NewsHackers Exploit Jarsigner Tool to Deploy XLoader Malware

Hackers Exploit Jarsigner Tool to Deploy XLoader Malware

Published on

SIEM as a Service

Follow Us on Google News

Security researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a new campaign leveraging the legitimate JAR signing tool, jarsigner.exe, to distribute the XLoader malware.

The attack employs a DLL side-loading technique, where malicious DLL files are placed alongside legitimate executable files to ensure their execution when the legitimate application is run.

This method exploits the trust associated with legitimate software to bypass security defenses.

- Advertisement - Google News

Malicious DLL Side-Loading Technique Identified

The jarsigner tool, a component of the Eclipse Foundation’s Integrated Development Environment (IDE) package, is typically used for signing Java Archive (JAR) files.

However, in this attack, it has been weaponized by bundling it with malicious files in a compressed archive.

The archive contains three key components: a legitimate executable file renamed as Documents2012.exe, and two malicious DLLs jli.dll and concrt140e.dll.

XLoader Malware
Comparison of export function lists: legitimate jli.dll vs. malicious jli.dll

Anatomy of the Attack

The malicious jli.dll serves as the primary enabler of the attack.

Unlike its legitimate counterpart, which contains distinct export functions, this tampered version maps all export functions to a single address, ensuring that any function call triggers the attacker’s code.

This DLL decrypts and injects the second malicious file, concrt140e.dll, into a legitimate process (aspnet_wp.exe), effectively deploying the XLoader malware.

XLoader is an advanced information-stealing malware capable of exfiltrating sensitive data such as browser credentials and system information.

According to ASEC, it can also download additional payloads, amplifying its threat potential.

The malicious files in this campaign lack valid digital signatures, unlike the legitimate components signed by the Eclipse Foundation, making them identifiable upon close inspection.

This attack highlights the dangers of DLL side-loading, where threat actors exploit trust in legitimate software to execute malicious code.

By distributing these files together in compressed archives, attackers aim to deceive users into executing them without suspicion.

To mitigate such threats, users and organizations are advised to:

  • Exercise caution when handling executable files bundled with DLLs from unverified sources.
  • Regularly update endpoint protection tools to detect unsigned or suspicious DLLs.
  • Monitor for anomalous behaviors in trusted applications that could indicate tampered components.

The MD5 hashes associated with this campaign (42f5b18d194314f43af6a31d05e96f16 and 8e6763e7922215556fa10711e1328e08) and suspicious URLs (e.g., http[:]//www[.]datarush[.]life/uhtg/) should be actively blocked in security systems.

As attackers continue refining their techniques, proactive measures remain critical to safeguarding systems against sophisticated threats like XLoader.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...