The loader-as-a-service (LaaS) often called FakeBat has turn out to be one of the vital widespread loader malware households distributed utilizing the drive-by obtain method this 12 months, findings from Sekoia reveal.
“FakeBat primarily goals to obtain and execute the next-stage payload, equivalent to IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif,” the corporate mentioned in a Tuesday evaluation.
Drive-by assaults entail using strategies like SEO (search engine optimisation) poisoning, malvertising, and nefarious code injections into compromised websites to entice customers into downloading bogus software program installers or browser updates.
Using malware loaders over the previous few years dovetails with the rising use of touchdown pages impersonating official software program web sites by passing them off as official installers. This ties into the bigger side that phishing and social engineering stay one of many risk actors’ important methods to accumulate preliminary entry.
FakeBat, often known as EugenLoader and PaykLoader, has been supplied to different cybercriminals beneath a LaaS subscription mannequin on underground boards by a Russian-speaking risk actor named Eugenfest (aka Payk_34) since at the least December 2022.
The loader is designed to bypass safety mechanisms and supplies clients with choices to generate builds utilizing templates to trojanize official software program in addition to monitor installations over time via an administration panel.
Whereas the sooner variations made use of an MSI format for the malware builds, latest iterations noticed since September 2023 have switched to an MSIX format and added a digital signature to the installer with a sound certificates to sidestep Microsoft SmartScreen protections.
The malware is offered for $1,000 per week and $2,500 monthly for the MSI format, $1,500 per week and $4,000 monthly for the MSIX format, and $1,800 per week and $5,000 monthly for the mixed MSI and signature package deal.
Sekoia mentioned it detected completely different exercise clusters disseminating FakeBat by three major approaches: Impersonating in style software program via malicious Google adverts, pretend net browser updates through compromised websites, and social engineering schemes on social networks. This encompasses campaigns probably associated to the FIN7 group, Nitrogen, and BATLOADER.
“Along with internet hosting payloads, FakeBat [command-and-control] servers extremely probably filter site visitors primarily based on traits such because the Consumer-Agent worth, the IP deal with, and the situation,” Sekoia mentioned. “This permits the distribution of the malware to particular targets.”
The disclosure comes because the AhnLab Safety Intelligence Heart (ASEC) detailed a malware marketing campaign distributing one other loader named DBatLoader (aka ModiLoader and NatsoLoader) via invoice-themed phishing emails.
It additionally follows the invention of an infection chains propagating Hijack Loader (aka DOILoader and IDAT Loader) through pirated film obtain websites to finally ship the Lumma info stealer.
“This IDATLOADER marketing campaign is utilizing a fancy an infection chain containing a number of layers of direct code-based obfuscation alongside progressive methods to additional conceal the maliciousness of the code,” Kroll researcher Dave Truman mentioned.

“The an infection hinged round using Microsoft’s mshta.exe to execute code buried deep inside a specifically crafted file masquerading as a PGP Secret Key. The marketing campaign made use of novel diversifications of widespread strategies and heavy obfuscation to cover the malicious code from detection.”
Phishing campaigns have additional been noticed delivering Remcos RAT, with a brand new Jap European risk actor dubbed Unfurling Hemlock leveraging loaders and emails to drop binary recordsdata that act as a “cluster bomb” to unfold completely different malware strains directly.
“The malware being distributed utilizing this system is usually comprised of stealers, equivalent to RedLine, RisePro, and Mystic Stealer, and loaders equivalent to Amadey and SmokeLoader,” Outpost24 researcher Hector Garcia mentioned.
“A lot of the first phases have been detected being despatched through e mail to completely different firms or being dropped from exterior websites that have been contacted by exterior loaders.”