Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Windows Installers Target Korean and Chinese Users with Sneaky Malware
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Windows Installers Target Korean and Chinese Users with Sneaky Malware
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Malicious Windows Installers Target Korean and Chinese Users with Sneaky Malware

Security

Malicious Windows Installers Target Korean and Chinese Users with Sneaky Malware

New "UULoader" malware threat spread via malicious Windows installers targeting Korean and Chinese speakers.

Marco Rizal
Last updated: September 15, 2024 12:16 pm
By Marco Rizal - Editor, Journalist 4 Min Read
Share
Malicious Windows Installers Target Korean and Chinese Users with Sneaky Malware
SHARE

Cybersecurity researchers at Cyberint discovered a substantial rise in the use of harmful .msi files, which are Windows installers created with the intention of disseminating malware.

This method of attack, although not widely used, has shown to be quite effective. It involves a new malware delivery method called “UULoader” that has been specifically targeting Korean and Chinese speakers since July 2024.

UULoader disguises itself as genuine software or updates, deceiving users into unwittingly installing it. After being executed, the malware uses clever tactics to evade detection.

It works by removing the file headers, which are the identifying data at the beginning of files that help security software recognize file types.

This strategy enables the malware to bypass initial security scans, making it appear as harmless data instead of dangerous malware.

The UULoader's core files are concealed in a Microsoft Cabinet archive (.cab) that consists of two essential components: an executable file (.exe) and a dynamic link library file (.dll).

file no mz
Credits: Cyberint

Both have their headers removed, which helps to avoid detection. Often, the stripped executable is a valid, outdated version of a Realtek file that serves as a “side-loader” for the malicious .dll. This file ultimately loads the final malware payload in a straightforward manner.

In addition, UULoader frequently includes a decoy file that appears legitimate, such as a software update for Chrome. This is done to divert users' attention from the malicious activity occurring in the background.

A multi-stage attack

The UULoader malware follows a series of stages once it is executed. It starts by creating a folder named “Microsoft Thunder” on the target's computer and then proceeds to install the harmful files.

create dir
Credits: Cyberint

In addition, a script is executed to include this folder in Windows Defender's exclusion list. This ensures that the security software will not detect the malware.

The malware relies on a side-loader technique, where a legitimate executable is deceived into loading a malicious .dll file. The UULoader usually delivers a remote access tool (RAT), like Gh0stRat, that grants attackers full control over the compromised system.

UULoader has been observed being used alongside other hacking tools, such as Mimikatz, which are commonly used for stealing credentials.

UULoader's attack stands out due to the usage of “junk” code in its scripts. These nonsensical actions, like arithmetic calculations, serve no practical function other than to increase the size of the script.

This technique aims to deceive security systems by concealing the malicious components of the script within seemingly harmless bloated code.

Likely origins and impact

Based on Cyberint's analysis, it appears that UULoader was created by someone who speaks Chinese due to how the code was written.

The researchers have not yet identified the specific threat actor responsible for the malware. However, the use of RATs like Gh0stRat, which is often associated with Chinese hackers, suggests a possible origin.

UULoader's capability of bypassing static detection methods has rendered it as a formidable threat. The initial submissions of the malware to VirusTotal, a popular malware scanning service, had a relatively low detection rate.

This suggests that the threat has managed to spread without being noticed, potentially impacting a large number of users before security vendors became aware.

More Stories

LockBit Ransomware Group Claims Attack on U.S. Federal Reserve

Voldemort’s New Spell Now Targets Taxpayers Instead

When The House Loses; Gambling Industry Caught Off Guard By Hackers

Financial Institution Leaked 110GB of Driver’s Licenses, IDs, and Bank Statements

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

5 million Israelis got terrifying texts

5 million Israelis got terrifying texts — Israel blames Iran and Hezbollah

Fortinet Got Hacked and the Hackers Name is the Icing on the Cake

Fortinet Got Hacked, and the Hacker’s Name is the Icing on the Cake

Hackers Can Use Screen Noise to Steal Data on Air Gapped PCs

Hackers Can Use Screen Noise to Steal Data on Air-Gapped PCs

Microsoft Employee Data Breach Over 2000 Employees Data Leaked

Microsoft Employee Data Breach; Over 2,000 Employees’ Data Leaked

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?