Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar

Posted on July 16, 2025July 17, 2025 By CWS

Hong Kong’s monetary sector is contending with a recent surge of SquidLoader samples that glide previous typical defenses with virtually no antivirus flags.

First noticed in early July 2025, the loader arrives via rigorously worded spear-phishing emails written in Simplified Chinese language and bearing password-protected RAR attachments masquerading as respectable bond-registration paperwork.

As soon as the consumer extracts the archive and double-clicks what seems to be a Microsoft Phrase icon, execution pivots to a malicious PE file designed to resemble AMD’s AMDRSServ.exe, silently laying the groundwork for compromise.

Inside that counterfeit executable, management is secretly hijacked within the CRT epilogue lengthy earlier than WinMain() is reached, permitting SquidLoader to unpack itself and light-weight up its multi-stage an infection chain.

Trellix analysts famous that this primary stage merely iterates via 78,469 packed bytes, making use of an XOR 0xF4 operation and including 19 to every worth to disclose the loader’s true code.

for(size_t i = 0; i

With the payload decrypted, Stage 2 walks the Course of Surroundings Block to find ntdll.dll and kernel32.dll, dynamically resolves scores of APIs, and shops their addresses—plus thread, PEB, and TEB metadata—in a customized stack construction whose pointer is hidden inside unused PEB reminiscence.

This tactical sleight of hand eradicates static strings and thwarts signature-based hunters.

Trellix researchers recognized SquidLoader’s last goal because the in-memory launch of a Cobalt Strike Beacon that studies to shifting Kubernetes-themed endpoints akin to 39.107.156.136 /api/v1/namespaces/kube-system/companies earlier than handing off to a secondary beacon host at 182.92.239.24.

For victims, the result’s covert distant entry that blends seamlessly with regular HTTPS site visitors whereas safety groups stay blind to the breach.

Detection Evasion Ways

The loader’s most ingenious tips revolve round exhaustive anti-analysis routines that frustrate sandboxing and stay debugging alike.

Early in Stage 3, SquidLoader invokes NtQuerySystemInformation with the undocumented SystemKernelDebuggerInformation selector; any non-zero return code alerts a kernel debugger and triggers self-destruct.

It then enumerates working processes by way of SystemProcessInformation, blacklisting a laundry checklist of debuggers—from Olldbg.exe to x64dbg.exe—together with widespread AV brokers akin to MsMpEng.exe and kav.exe; detection of any goal once more prompts fast termination.

A very thorny thread/APC trick spins up a employee thread that sleeps for 1,000,000 ms, queues an APC to itself, and waits, emulators that speed up Sleep() or mishandle APC supply return sudden NTSTATUS values, inflicting the malware to exit earlier than analysts can connect.

Lastly, a Mandarin-language message field—“The file is corrupted and can’t be opened”—calls for consumer interplay, a easy but efficient option to bypass automated sandboxes that lack GUI management.

Collectively, these layers be sure that by the point incident responders understand a beacon is looking dwelling, SquidLoader has already slipped beneath the sonar and out to sea.

Examine stay malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Detection, Malware, NearZero, Radar, Sophisticated, SquidLoader, Swim

Post navigation

Previous Post: Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation
Next Post: United Natural Foods Projects Up to $400M Sales Hit from June Cyberattack

Related Posts

X/Twitter The Most Aggressive Social Media App Collecting Users Location Information Cyber Security News
Linux 6.16-rc4 Released With Fixes for Filesystem, Driver & Hardware Support Cyber Security News
CISOs Role in Driving Secure Digital Transformation Cyber Security News
U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity Cyber Security News
Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections Cyber Security News
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News