Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SoupDealer Malware Bypasses Every Sandbox, AV’s and EDR/XDR in Real-World Incidents

Posted on August 11, 2025August 11, 2025 By CWS

In early August 2025, cybersecurity groups in Türkiye noticed a brand new, extremely evasive Java‐primarily based loader that slipped previous each public sandbox, antivirus answer, and even enterprise EDR/XDR platforms.

This risk—codenamed SoupDealer—surfaced as a phishing marketing campaign distributing a 3‐stage loader by way of information corresponding to TEKLIFALINACAKURUNLER.jar.

Deployed via focused spearphishing, the preliminary .jar file solely unpacks its true payload after verifying the sufferer’s surroundings is working Home windows in Turkish and situated inside Türkiye.

As soon as confirmed, it downloads Tor, schedules persistent duties, and establishes a covert C2 channel over the Tor community.

Malwation researchers famous that this marketing campaign leveraged customized class loaders to decrypt and cargo successive payloads totally in reminiscence, thwarting static and dynamic evaluation engines.

After the primary stage’s obfuscation layers are peeled away, a small Java class (Loader7) performs AES‐ECB decryption of an embedded useful resource named d6RuwzOkGZM12DXi.

11 lessons and a stage2 payload (Supply – Malwation)

The decryption key, hardcoded as a easy string, is expanded by way of SHA-512 and truncated to derive the AES key. As soon as decrypted, the stage2 payload emerges as stage2.jar, which itself accommodates a matryoshka‐fashion RC4‐encrypted “stub” useful resource.

Following the second stage, the decrypted stub class makes use of a customized findClass override to outline lessons immediately from RC4‐decrypted byte arrays, successfully sidestepping on‐disk indicators..In stay incidents, SoupDealer bypassed host‐primarily based antivirus checks by confirming no safety merchandise have been energetic earlier than continuing. It then downloads and runs Tor if not already current, verifying connectivity by way of test.torproject.org over a localhost proxy.

Customized ClassLoader (Supply – Malwation)

Lastly, it launches the Adwind backdoor module, establishing an onion‐routed C2 connection on predefined ports with encrypted authentication.

Persistence and Detection Evasion

SoupDealer’s persistence hinges on each Home windows Job Scheduler and registry modifications masquerading below benign names.

Upon gaining administrative privileges, it creates a scheduled activity with a randomized identify, invoking the Java loader every day with a startup delay.

Obfuscation operations (Supply – Malwation)

Concurrently, it writes to HKCUSoftwareMicrosoftWindowsCurrentVersionRun utilizing a REGEDIT‐formatted .reg script.

Python Decryption Script for d6RuwzOkGZM12DXi
import hashlib
from Crypto.Cipher import AES

KEY = “875758066416”
key = hashlib.sha512(KEY.encode(“utf-8”)).digest()[:16]

with open(“d6RuwzOkGZM12DXi”, “rb”) as f:
ciphertext = f.learn()

cipher = AES.new(key, AES.MODE_ECB)
plaintext = cipher.decrypt(ciphertext)

with open(“stage2.jar”, “wb”) as f:
f.write(plaintext)

To evade heuristic detection, every stage incorporates junk operations and string encryption, eradicating all nonessential code earlier than execution.

The dynamic unpacking strategy ensures that code seen in reminiscence bears no resemblance to static signatures, rendering conventional AV engines and sandbox detectors blind.

By mixing multi‐stage decryption, in‐reminiscence class loading, and conditional execution checks, SoupDealer exemplifies subsequent‐era stealth malware that thrives in actual‐world environments.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:AVs, Bypasses, EDRXDR, Incidents, Malware, RealWorld, Sandbox, SoupDealer

Post navigation

Previous Post: Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
Next Post: New TETRA Radio Encryption Flaws Expose Law Enforcement Communications

Related Posts

Microsoft and CrowdStrike Teaming Up to Bring Clarity To Threat Actor Mapping Cyber Security News
Countering Spear Phishing with Advanced Email Security Solutions Cyber Security News
Four Hackers Arrested by UK Police for Attacks on M&S, Co-op and Harrods Stores Cyber Security News
Strengthening Security Measures In Digital Advertising Platforms Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News