Darkstream Dispatch Vol.3_GOOTLOADER

June 10, 2025
Musa Nadir Sani

Introduction

Darkstream Dispatch is a monthly intelligence report dedicated to tracking and analyzing malware families, threat actors, and cyber campaigns primarily targeting Civil Society Organizations (CSOs), human rights defenders, and advocacy groups. As digital threats become more sophisticated, CSOs face increasing risks from state-sponsored actors, cybercriminals, and surveillance campaigns designed to compromise their operations, communications, and safety. This volume focuses on GOOTLOADER, a Javascript malware.

Description

Gootloader is a JavaScript-based malware family that primarily uses SEO poisoning and compromised websites to trick users into downloading a ZIP archive disguised as a document they were searching for. Initial analysis shows that Gootloader infections occurred across various sectors, typically after victims visited compromised websites offering fake information related to contracts or legal and financial documents. These victims were likely led to such sites through search engine queries using keywords like “agreement,” “contract,” or the names of financial institutions. The widespread nature of these detections suggests that Gootloader operates opportunistically, rather than targeting specific industries or organizations. As such, it remains a persistent threat to all organizations.

Overview

Malware Type: 

Downloader

Operating System: 

Windows

Aliases:  

SLOWPOUR

Confirmed Targeted Industries: 

Civil Society & Non-Profits, Aerospace & Defense, Chemicals & Materials, Construction & Engineering, Education, Energy & Utilities, Financial Services, Government, Healthcare, Hospitality, Insurance, Legal & Professional Services, Manufacturing, Media & Entertainment, Pharmaceuticals, Retail, Technology, Telecommunications, and Transportation.

Associated Threat Actors: 

FIN12, UNC2565, UNC2727, UNC3944, UNC4120, UNC5636

Associated Malware: 

BEACON, GOOTLOADER.POWERSHELL

Associated Vulnerabilities: 

N/A

Associated Tools

COBALTSTRIKE

Find the full list of IOCs here: https://intel471.com/blog/threat-hunting-case-study-tracking-down-gootloader

Security Recommendations

To combat the ever-growing threats posed by malware that fall under the downloader class, CcHUB recommends that organizations;

  • Have functional antivirus software with up to date databasees
  • Conduct regular audits of their information systems
  • Conduct regular employee awareness training

To read more about how you or your organization can track GOOTLOADER, kindly read the Intel471 article here.
If you also suspect a security breach of some sort, reach out to us on our helpdesk (help@cchub.africa)

Related Posts

Scroll to Top