Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. XORIndex Loader

XORIndex Loader

XORIndex Loader is a XOR-encoded loader that collects host data, decodes follow-on scripts and acts as a downloader for theBeaverTail malware.XORIndex Loader was first reported in June 2025.XORIndex Loader has been leveraged by North Korea-affiliated threat actors identified asContagious Interview.XORIndex Loader has been delivered to victims through code repository sites utilizing typo squatting naming conventions of various npm packages.[1]

ID: S1248
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 22 October 2025
Last Modified: 24 October 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

XORIndex Loader has used HTTPS POST to communicate with C2.[1]

EnterpriseT1059.007Command and Scripting Interpreter:JavaScript

XORIndex Loader has executed malicious JavaScript code.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

XORIndex Loader can decode its payload prior to execution.[1]

EnterpriseT1041Exfiltration Over C2 Channel

XORIndex Loader has exfiltrated victim data using HTTPS POST requests to its C2 servers.[1]

EnterpriseT1105Ingress Tool Transfer

XORIndex Loader has been used to download a malicious payload to includeBeaverTail.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

XORIndex Loader has leveraged legitimate package names to mimic frequently utilized tools to entice victims to download and execute malicious payloads.[1]

EnterpriseT1027.010Obfuscated Files or Information:Command Obfuscation

XORIndex Loader has obfuscated strings using ASCII buffers and TextDecoder.[1]

.013Obfuscated Files or Information:Encrypted/Encoded File

XORIndex Loader has encoded module names and C2 URLs as hexadecimal strings in attempts to evade analysis.[1]

EnterpriseT1082System Information Discovery

XORIndex Loader has the ability to collect the hostname, OS Username, Geolocation, and OS version of an infected host.[1]

EnterpriseT1614System Location Discovery

XORIndex Loader can identify the geographical location of a victim host.[1]

EnterpriseT1016System Network Configuration Discovery

XORIndex Loader has leveraged webservices to identify the public IP of the victim host.[1]

EnterpriseT1033System Owner/User Discovery

XORIndex Loader has collected the username from the victim host.[1]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp