"CherryLoader Malware: Mimicking CherryTree for Privilege Escalation"

1 min read
Source: The Hacker News
"CherryLoader Malware: Mimicking CherryTree for Privilege Escalation"
Photo: The Hacker News
TL;DR Summary

A new Go-based malware loader called CherryLoader has been discovered, masquerading as the legitimate CherryTree note-taking application, to deliver privilege escalation tools such as PrintSpoofer and JuicyPotatoNG onto compromised hosts for follow-on exploitation. It packs modularized features that allow threat actors to swap exploits without recompiling code and uses encryption methods and anti-analysis techniques to evade detection. The loader is distributed through a RAR archive file and leverages fileless techniques for execution, ultimately setting up persistence on the host and disarming Microsoft Defender.

Share this article

Reading Insights

Total Reads

0

Unique Readers

4

Time Saved

2 min

vs 2 min read

Condensed

79%

39083 words

Want the full story? Read the original article

Read on The Hacker News