www.malwarebytes.com
Open in
urlscan Pro
192.0.66.233
Public Scan
Submitted URL: https://www.malwarebytes.com/blog/cybercrime/2024/11/hello-again-fakebat-popular-loader-returns-after-months-long-hiatus
Effective URL: https://www.malwarebytes.com/blog/news/2024/11/hello-again-fakebat-popular-loader-returns-after-months-long-hiatus
Submission Tags: @nominet_threat_intel feedly-filtered-v1.0 reference_article_link confidence_null cluster_55238293 Search All
Submission: On November 14 via api from GB — Scanned from GB
Effective URL: https://www.malwarebytes.com/blog/news/2024/11/hello-again-fakebat-popular-loader-returns-after-months-long-hiatus
Submission Tags: @nominet_threat_intel feedly-filtered-v1.0 reference_article_link confidence_null cluster_55238293 Search All
Submission: On November 14 via api from GB — Scanned from GB
Form analysis
4 forms found in the DOMGET https://www.malwarebytes.com/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Type to search..." value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://www.malwarebytes.com/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Type to search..." value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://www.malwarebytes.com/blog/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/blog/">
<div class="labs-sub-nav__searchbar-wrap">
<input class="labs-sub-nav__search-input" type="text" name="s" placeholder="Search Labs">
<button class="labs-sub-nav__search-button" id="cta-labs-rightrail-search-submit-en" aria-label="Search in Malwarebytes">
<svg xmlns="http://www.w3.org/2000/svg" width="35px" height="35px" viewBox="0 0 24 24" fill="none">
<g clip-path="url(#clip0_15_152)">
<rect width="24" height="24" fill="none"></rect>
<circle cx="10.5" cy="10.5" r="6.5" stroke="#0d3ecc" stroke-linejoin="round"></circle>
<path d="M19.6464 20.3536C19.8417 20.5488 20.1583 20.5488 20.3536 20.3536C20.5488 20.1583 20.5488 19.8417 20.3536 19.6464L19.6464 20.3536ZM20.3536 19.6464L15.3536 14.6464L14.6464 15.3536L19.6464 20.3536L20.3536 19.6464Z" fill="#0d3ecc">
</path>
</g>
<defs>
<clipPath id="clip0_15_152">
<rect width="24" height="24" fill="#0d3ecc"></rect>
</clipPath>
</defs>
</svg>
</button>
</div>
</form>
https://www.malwarebytes.com/newsletter/
<form action="https://www.malwarebytes.com/newsletter/" class="newsletter-form">
<div class="newsletter-form__inline">
<label>Email Address</label>
<input type="email" name="email" id="cta-footer-newsletter-input-email-en" placeholder="Email Address" required="" class="newsletter-form__email">
<input type="hidden" class="newsletter-form__pageurl" value="https://www.malwarebytes.com/blog/news/2024/11/hello-again-fakebat-popular-loader-returns-after-months-long-hiatus">
<input name="source" type="hidden" value="">
<input type="submit" value="Sign Up" class="newsletter-form__btn" id="cta-footer-newsletter-subscribe-email-en">
</div>
<div class="newsletter-form__validate hidden">
<span></span>
</div>
</form>
Text Content
Skip to content Search Search Malwarebytes.com Search for: * Sign In * Personal < Personal Products * Malwarebytes Premium Security > * Malwarebytes Privacy VPN > * Malwarebytes Identity Theft Protection > * Personal Data Remover > * Malwarebytes Browser Guard > * Malwarebytes for Teams/small offices > * AdwCleaner for Windows > -------------------------------------------------------------------------------- Find the right product See our plans Infected already? Clean your device now Solutions * Free antivirus > * Free virus scan & removal > * Windows antivirus > * Mac antivirus > * Android antivirus > * iOS security > * Digital Footprint Scan > See personal pricing Manage your subscription Visit our support page * Business < Business BUNDLES * ThreatDown Bundles * Protect your endpoints with powerfully simple and cost-effective bundles * Education Bundles * Secure your students and institution against cyberattacks TECHNOLOGY HIGHLIGHTS * Managed Detection & Response (MDR) * Deploy fully-managed threat monitoring, investigation, and remediation * Endpoint Detection & Response (EDR) * Prevent more attacks with security that catches what others miss * Explore our portfolio > Visualize and optimize your security posture in just minutes. Learn more about Security Advisor (available in every bundle). > * Pricing < Pricing Personal pricing Protect your personal devices and data Small office/home office pricing Protect your team’s devices and data Business pricing (5+ employees) Step up your corporate endpoint security. Save up to 45% * Partners < Partners Malwarebytes * Affiliate partner > * Computer repair > ThreatDown: Malwarebytes for Business * Resellers > * Managed Service Providers (MSP/ISS) > * Resources < Resources * Security terms glossary > * Threat Center > * Cybersecurity News > * About Malwarebytes > * Press > * Careers > Cybersecurity Resource Center * Antivirus > * Malware > * Ransomware > * Phishing > * See all articles > * Support < Support Malwarebytes Personal Support Malwarebytes and Teams Customers ThreatDown Business Support Nebula and Oneview Customers Community Forums Free Download * Sign In Search Search Search Malwarebytes.com Search for: SUBSCRIBE rss Cybercrime HELLO AGAIN, FAKEBAT: POPULAR LOADER RETURNS AFTER MONTHS-LONG HIATUS Posted: November 8, 2024 by Jérôme Segura The web browser, and search engines in particular, continue to be a popular entry point to deliver malware to users. While we noted a decrease in loaders distributed via malvertising for the past 3 months, today’s example is a reminder that threat actors can quickly switch back to tried and tested methods. After months of absence, Fakebat (AKA Eugenloader, PaykLoader) showed up on our radar again via a malicious Google ad for the productivity application Notion. FakeBat is a unique loader that has been used to drop follow-up payloads such as Lumma stealer. In this blog post, we detail how criminals are targeting their victims and what final malware payload they are delivering post initial infection. The incident was found and reported to Google on the same day as this publication. GOOGLE ADS DISTRIBUTION Last time we saw FakeBat was on July 25 2024, via a malicious ad for Calendly, a popular online scheduling application. In that instance, FakeBat’s command and control infrastructure ran from utd-gochisu[.]com. Fast forward to November 8, 2024, and we have an ad appearing at the top of a Google search for ‘notion’. That sponsored result looks entirely authentic, with an official logo and website. We already know that criminals are able to impersonate any brand of their liking by simply using a click tracker — or tracking template — in order to bypass detection. According to Google’s Ads Transparency Center , the Notion ad was shown in the following geographic locations: Below is the network traffic from the ad URL to the payload. We can see the use of the tracking template (smart.link), followed by a cloaking domain (solomonegbe[.]com), before landing on the decoy site (notion[.]ramchhaya.com): Why does this work and bypasses Google? Likely because if the user is not an intended victim, the tracking template would redirect them to the legitimate notion.so website. FAKEBAT DROPS LUMMAC2 STEALER After extracting the payload, we recognize the classic first stage FakeBat PowerShell: Security researcher and long time FakeBat enthusiast RussianPanda was kind enough to give us a hand by looking at this installer in closer detail. After some fingerprinting to avoid sandboxes, we get this second stage PowerShell: Of note, the threat actors are still using the same old RastaMouse AMSI bypass script from April 2024: The loader is obfuscated with .NET Reactor, where it decrypts the embedded resource with AES and then injects it into MSBuild.exe via process hollowing: The decrypted payload is LummaC2 Stealer with user ID: 9zXsP2. CONCLUSION While malicious ads delivering malware payloads have been a little more rare for the past several weeks, today’s example shows that threat actors can and will make a comeback whenever the time is right. Brand impersonation via Google ads remains problematic, as anyone can leverage built-in features to appear legitimate and trick users into downloading malware. We appreciate and would like to thanks RussianPanda‘s quick analysis on the payload, as well as security researcher Sqiiblydoo for reporting the malicious certificate used to sign the installer. -------------------------------------------------------------------------------- We don’t just report on threats—we remove them Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today. INDICATORS OF COMPROMISE Malvertising chain solomonegbe[.]com notion[.]ramchhaya.com Malicious Notion URL furnotilioin[.]site/Notion[.]appx Malicious Notion installer 34c46b358a139f1a472b0120a95b4f21d32be5c93bc2d1a5608efb557aa0b9de FakeBat C2 ghf-gopp1rip[.]com 1.jar (PaykRunPE) 2de8a18814cd66704edec08ae4b37e466c9986540da94cd61b2ca512d495b91a LummaC2 (decrypted payload) de64c6a881be736aeecbf665709baa89e92acf48c34f9071b8a29a5e53802019 JwefqUQWCg (encrypted resource) 6341d1b4858830ad691344a7b88316c49445754a98e7fd4a39a190c590e8a4db Malicious URLs furliumalerer[.]site/1.jar pastebin[.]pl/view/raw/a58044c5 LummaC2 Stealer C2s: rottieud[.]sbs relalingj[.]sbs repostebhu[.]sbs thinkyyokej[.]sbs tamedgeesy[.]sbs explainvees[.]sbs brownieyuz[.]sbs slippyhost[.]cfd ducksringjk[.]sbs SHARE THIS ARTICLE RELATED ARTICLES News | Threats ADVERTISERS ARE PUSHING AD AND POP-UP BLOCKERS USING OLD TRICKS November 14, 2024 - A malvertising campaign using an old school trick was found pushing to different ad blockers. CONTINUE READING 0 Comments News | Scams SCAMMER ROBS HOMEBUYERS OF LIFE SAVINGS IN $20 MILLION THEFT SPREE November 14, 2024 - A scammer was caught after they defrauded some 400 people for almost $20 million in real estate. CONTINUE READING 0 Comments News TEMU MUST RESPECT CONSUMER PROTECTION LAWS, SAYS EU November 13, 2024 - Temu is under investigation for a variety of misleading practices. CONTINUE READING 0 Comments News | Personal WARNING: ONLINE SHOPPING THREATS TO AVOID THIS BLACK FRIDAY AND CYBER MONDAY November 13, 2024 - Where there’s a gift to be bought, there’s also a scammer out to make money. Here's how to stay safe this shopping season. CONTINUE READING 0 Comments News | Privacy DNA TESTING COMPANY VANISHES ALONG WITH ITS CUSTOMERS’ GENETIC DATA November 12, 2024 - Atlas Biomed, a DNA testing company that promised clients insights into their genetic disposition has suddenly disappeared. CONTINUE READING 36 Comments ABOUT THE AUTHOR Jérôme Segura Sr Director, Research Contributors Threat Center Podcast Glossary Scams Cyberprotection for every one. COMPUTER SECURITY * Rootkit Scanner * Trojan Scanner * Free Antivirus * Free Virus Scan * Premium protection MOBILE SECURITY * Antivirus for Android * iOS Security and Spam Blocker PRIVACY PROTECTION * Privacy VPN (Virtual Private Network) * Digital Footprint Scan * Dark Web Monitoring * Adware Removal * Ad Blocker IDENTITY PROTECTION * Identity Monitoring & Alerts * Credit Monitoring & Reporting * Identity Recovery & Resolution * ID Theft Insurance * Personal Data Remover LEARN ABOUT CYBERSECURITY * Blog * Social Engineering * Phishing * Ransomware * Malware * Antivirus * What is a VPN? * Doxxing PARTNER WITH MALWAREBYTES * Computer Repair * Affiliates ADDRESS One Albert Quay 2nd Floor Cork T12 X8N6 Ireland 3979 Freedom Circle 12th Floor Santa Clara, CA 95054 ABOUT MALWAREBYTES * Careers * News and Press * Vulnerability Disclosure * False Positive Report * Forums GET HELP * Help Center * Sign in to MyAccount * Business Endpoint Security Solutions * Managed Service Provider (MSP) Program * Twitter * Facebook * LinkedIn * Youtube * Instagram CYBERSECURITY INFO YOU CAN’T LIVE WITHOUT Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats. Email Address * Legal * Privacy * Terms of Service * Accessibility * Imprint © 2024 All Rights Reserved This site uses cookies in order to enhance site navigation, analyze site usage and marketing efforts. Please see our privacy policy for more information. Privacy Policy Cookies Settings Decline All Accept All Cookies PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Privacy Policy Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE AND FUNCTIONALITY Performance and Functionality These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details ANALYTICS Analytics These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details ADVERTISING Advertising These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Decline All Confirm My Choices