Aresloader

Malware Profile Updated 3 months ago
Download STIX
Preview STIX
AresLoader is a type of malware that was first advertised for sale on the top-tier Russian-language hacking forum XSS in December 2022 by a threat actor named "DarkBLUP". This malicious software is designed to exploit and damage computer systems, often infiltrating through suspicious downloads, emails, or websites. Once inside a system, AresLoader can steal personal information, disrupt operations, or even hold data hostage for ransom. It creates a Registry AutoRun key to obtain and retain unauthorized access to the victim’s environment. The AresLoader panel is managed and hosted by the malware seller, with all builds communicating with a single server. The IP address used by AresLoader's server belongs to the autonomous system number (ASN) AS204603 and is registered as Partner LLC. Throughout 2023, the use of AresLoader expanded alongside several other malware families, including Nokoyawa and BlackBasta ransomware. These malware were obtained or purchased from FIN7 developers such as Minodo and Diceloader. Other new malware families that appeared during this period include Canyon, Vidar, and LummaC2. AresLoader has been identified as a backdoor/downloader, aiding in initial access or information stealing. IBM Security X-Force noted that crypters, applications designed to encrypt and obfuscate malware to evade detection, were being used to disseminate new malware strains like AresLoader. The development and deployment of AresLoader have been accompanied by some confusion due to the simultaneous development of other loaders like BlackSuit and Royal's close working relationship with BlackCat. Despite these challenges, AresLoader continues to be a significant threat. Its sellers have set up a Telegram channel to facilitate discussions related to the bot. Furthermore, Partner LLC, the entity hosting AresLoader's server, also hosts the "Shark" stealer panel, indicating support for other malicious infrastructures besides AresLoader.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Locker Ransomware
1
Locker ransomware, a type of malware, poses significant risks to computer systems and data. Unlike crypto-ransomware which encrypts user data, locker ransomware locks users out of their devices entirely, demanding a ransom payment to restore access without any data encryption. This threat has evolve
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Loader
Malware
Telegram
Ransomware
Maas
Trojan
citrix
Russia
Bot
Flashpoint
Antivirus
Gbhackers
Encrypt
Backdoor
XSS (Cross S...
Loader Malware
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
AmadeyUnspecified
1
Amadey is a malicious software (malware) that has been found to be used in conjunction with other malware such as Remcos, GuLoader, and Formbook. Analysis of the infection chains revealed that the individual behind the sales of Remcos and GuLoader also uses Amadey and Formbook, using GuLoader as a p
Raccoon StealerUnspecified
1
Raccoon Stealer is a form of malware that was first identified in 2019. Developed by Russian-speaking coders and initially promoted on Russian-language hacking forums, the malicious software was designed to steal sensitive data from victims, including credit card information, email credentials, and
SystembcUnspecified
1
SystemBC is a malicious software (malware) that has been used in various cyber attacks to exploit and damage computer systems. This malware was observed in 2023, being heavily used with BlackBasta and Quicksand. It has been deployed by teams using BlackBasta during their attacks. Play ransomware act
RaccoonUnspecified
1
Raccoon is a highly potent and cost-effective Malware-as-a-Service (MaaS) primarily sold on dark web forums, used extensively by Scattered Spider threat actors to pilfer sensitive data. As per the "eSentire Threat Intelligence Malware Analysis: Raccoon Stealer v2.0" report published on August 31, 20
Nokoyawais related to
1
Nokoyawa is a notorious malware, particularly known for its ransomware capabilities. It has been associated with various other malicious software including Quantum, Royal, BlackBasta, Emotet, IcedID, CobaltStrike, SVCReady, CargoBay, Pushdo, Minodo, DiceLoader, AresLoader, LummaC2, Vidar, Gozi, Cany
Lummac2Unspecified
1
LummaC2 is a relatively new information-stealing malware, first discovered in 2022. The malicious software has been under active development, with researchers identifying LummaC2 4.0 as a dynamic malware strain in November 2023. It's been used by threat actors for initial access or data theft, often
VidarUnspecified
1
Vidar is a Windows-based malware written in C++, derived from the Arkei stealer, which is designed to infiltrate and exploit computer systems. It has been used alongside other malware variants such as Emotet, IcedID, CobaltStrike, SVCReady, CargoBay, Pushdo, Minodo, DiceLoader, AresLoader, LummaC2,
BlackbastaUnspecified
1
BlackBasta is a malicious software (malware) known for its disruptive and damaging effects on computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even ho
MinodoUnspecified
1
Minodo is a type of malware, a harmful program designed to exploit and damage computer systems. It can infiltrate your system through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data h
DiceloaderUnspecified
1
Diceloader is a type of malware, short for malicious software, that is designed to infiltrate and damage computer systems. It can infect systems through various means such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside a system, it can steal personal in
Lummac2 StealerUnspecified
1
LummaC2 Stealer is a prominent malware that has been increasingly utilized for initial access or information stealing over the past year. This malicious software, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers or devices by
Aid LockerUnspecified
1
None
SharkUnspecified
1
Shark is a type of malware, or malicious software, that was deployed by the cyber group OilRig. In 2021, OilRig updated its DanBot backdoor and began deploying the Shark, Milan, and Marlin backdoors, as highlighted in the T3 2021 issue of the ESET Threat Report. This harmful program can infiltrate s
BlacksuitUnspecified
1
BlackSuit is a malicious software (malware) that was introduced in May 2023, believed to be a rebranding of the Royal ransomware operation, which itself was a branch of the now-defunct Conti ransomware operation. Various sources have reported similarities in code between Royal and BlackSuit, further
LummaUnspecified
1
Lumma is a prominent malware, particularly known as an information stealer. It is delivered through various means, including suspicious downloads, emails, and websites. In one instance observed by Palo Alto Networks’ Unit 42, Lumma was sent over Latrodectus C2 in an infection chain. In another campa
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
FIN7Unspecified
1
FIN7, a notorious threat actor group known for its malicious activities, has recently been identified as targeting a large U.S. carmaker with phishing attacks. This group, which has previously operated behind fake cybersecurity companies such as Combi Security and Bastion Secure to recruit security
AlphvUnspecified
1
AlphV, also known as BlackCat, is a notable threat actor in the cybersecurity landscape. This group has been involved in numerous high-profile attacks, including stealing 5TB of data from Morrison Community Hospital and compromising Clarion, a global manufacturer of audio and video equipment for car
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the Aresloader Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
a year ago
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising
Flashpoint
a year ago
No title
BankInfoSecurity
a year ago
Are Akira Ransomware's Crypto-Locking Malware Days Numbered?
SecurityIntelligence.com
a year ago
The Trickbot/Conti Crypters: Where Are They Now?
CSO Online
a year ago
Russian hacktivists deploy new AresLoader malware via decoy installers
CERT-EU
a year ago
AresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo | IT Security News
CERT-EU
a year ago
AresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo
CERT-EU
a year ago
AresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo