Home > Cyber News > Previously Unknown Wslink Malware Loader Can Run As a Server

Previously Unknown Wslink Malware Loader Can Run As a Server

wslink malware loader

A previously unknown malware loader was uncovered this week. Called Wslink, the tool has been described as “simple yet remarkable,” capable of loading malicious Windows binaries. The loader has been used in attacks against Central Europe, North America, and the Middle East.

Wslink malware loader runs as a server

There is something unique in this previously undocumented loader, and it is its capability to run as a server and execute received modules in memory. According to the report compiled by ESET researchers, the initial compromise vector is also unknown. The researchers have been unable to obtain any of the modules the loader is supposed to receive. No code, functionality or operational similarities suggest that the loader has been coded by a known threat actor.

Wslink malware loader capabilities

“Wslink runs as a service and listens on all network interfaces on the port specified in the ServicePort registry value of the service’s Parameters key. The preceding component that registers the Wslink service is not known,” the report says.

Then, an RSA handshake follows with a hardcoded 2048-bit public key. Afterwards, the encrypted module is received with a unique identifier – signature and an additional key for its decryption.
“Interestingly, the most recently received encrypted module with its signature is stored globally, making it available to all clients. One can save traffic this way – transmit only the key if the signature of the module to be loaded matches the previous one,” ESET said.

An interesting discovery is that the modules reuse Wslink’s functions for communication, keys and sockets. This way, they don’t need to initiate new outbound connections. The loader also features a well-developed cryptographic protocol to safeguard the exchanged data.

Another new malware loader with the potential to become “the next big thing” in spam operations was detected by Cisco Talos. Dubbed SquirrelWaffle, the threat is currently “mal-spamming” malicious Microsoft Office documents. The end goal of the campaign is delivering the well-known Qakbot malware, as well as Cobalt Strike. These are two of the most common culprits used for targeting organizations worldwide.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree