Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»NUMOZYLOD Malware Distributed Through Popular Searches

    NUMOZYLOD Malware Distributed Through Popular Searches

    August 20, 2024

    The NUMOZYLOD malware family, also known as FakeBat, EugenLoader, and PaykLoader, has been linked to a surge in malware infections originating from malvertising campaigns.

    Researchers have analyzed the malware family to understand its infection methods and tailored variants to targeted victims.

    The Rise of NUMOZYLOD

    Since mid-2023, Mandiant Managed Defense has observed a surge in malware infections originating from malvertising campaigns. These attacks target users seeking popular business software through the use of a trojanized MSIX installers to execute PowerShell scripts and download an additional secondary payload. Researchers track this PowerShell script as NUMOZYLOD and attributes its distribution to the threat actor UNC4536, operating under the moniker ‘eugenfest.’

    Source: https://www.googlecloudcommunity.com/gc

    UNC4536 is part of a Malware-as-a-Service (MaaS) operation, distributing a variety of malware, including ICEDID, REDLINESTEALER, CARBANAK, LUMMASTEALER, and ARECHCLIENT2. Researchers note this as evidence of a surging underground economy, where threat actors actively collaborate to fulfill the supply and demand for specialized tools and services to carry out attack campaigns.

    Exploiting MSIX for Covert Malware Distribution

    A key feature of MSIX, the Windows application packaging format, is its ability to execute scripts with the help of the Package Support Framework (PSF). Threat actors have exploited this by bundling a malicious payload, such as NUMOZYLOD, within the MSIX package, which is then executed during the software installation process.

    Analysis of the trojanized MSIX file structure reveals how threat actors stage their resources and abuse MSIX features to gain initial access and evade detection. The structure consists of several key components, including:

    AppxManifest.xml: This XML file is the heart of the MSIX installer, specifying how the package is to be installed. It lists the languages supported by the application, which can offer insight into the malware author’s origin or the intended target audience for the malware’s distribution.
    Config.json: This configuration file is used by the Package Support Framework (PSF) to handle tasks that standard MSIX installations cannot directly support, such as launching specific processes alongside the main application. In the case of NUMOZYLOD, the config.json file instructs the MSIX installer to trigger the execution of the malicious PowerShell script during the installation of the software.
    StartingScriptWrapper.ps1: This file serves as a wrapper for executing PowerShell scripts specified in the config.json file.
    Virtual File System (VFS) folder: This virtual storage space within the MSIX package holds the application’s files and folders, separating them from the main system.

    Delivering Tailored Payload Variants

    UNC4536 operates as a malware distributor, leveraging NUMOZYLOD to deliver various secondary payloads to its “business partners.” The researchers have observed two NUMOZYLOD variants so far, each distributing different malware families.

    In one campaign, NUMOZYLOD was used to spread the CARBANAK backdoor, leveraging SEO poisoning tactics to direct victims to a malicious website mimicking the legitimate KeePass password manager. This NUMOZYLOD variant transmitted host information to attackers, subsequently downloading and executing the CARBANAK malware on infected systems.

    In another campaign, the researchers observed a heavily obfuscated NUMOZYLOD variant utilized to deliver the LUMMASTEALER infostealer payload. This variant employed multiple layers of obfuscation to impede analysis and evade security measures, including disabling the Antimalware Scan Interface (AMSI) to run undetected.

    The researchers have shared custom YARA-L rules to help protect against the campaign by detecting execution of the malicious Powershell scripts and executable file associated with the attacks.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBuild a custom HTTP client in Amazon Aurora PostgreSQL and Amazon RDS for PostgreSQL: An alternative to Oracle’s UTL_HTTP
    Next Article Iranian Threat Actor TA453 Targets Prominent Jewish Religious Figure with Fake Podcast Invitation

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Continuous Arcade Learning Environment (CALE): Advancing the Capabilities of Arcade Learning Environment

    Development

    Orchestrate seamless business systems integrations using Amazon Bedrock Agents

    Machine Learning

    CVE-2025-4726 – iSourcecode Placement Management System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Airing of Grievances: 12 Web Habits We Need to Quit Already

    Development

    Highlights

    Development

    US government sues Adobe for’deceptive’ business tactics and hiding steep subscription cancellation charges to ‘trap’ its customers

    June 18, 2024

    The US government sues Adobe for using deceptive tactics and exorbitant cancellation fees to prevent…

    ddh – fast duplicate file finder

    December 15, 2024

    Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers

    March 21, 2025

    CVE-2025-4272 – Mechrevo Control Console DLL Search Path Vulnerability

    May 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.