"CherryLoader Malware: Mimicking CherryTree for Privilege Escalation"

TL;DR Summary
A new Go-based malware loader called CherryLoader has been discovered, masquerading as the legitimate CherryTree note-taking application, to deliver privilege escalation tools such as PrintSpoofer and JuicyPotatoNG onto compromised hosts for follow-on exploitation. It packs modularized features that allow threat actors to swap exploits without recompiling code and uses encryption methods and anti-analysis techniques to evade detection. The loader is distributed through a RAR archive file and leverages fileless techniques for execution, ultimately setting up persistence on the host and disarming Microsoft Defender.
Reading Insights
Total Reads
0
Unique Readers
4
Time Saved
2 min
vs 2 min read
Condensed
79%
390 → 83 words
Want the full story? Read the original article
Read on The Hacker News