
Security researchers have discovered a new malware loader, dubbed "CountLoader," which is strongly associated with prominent Russian ransomware groups. The loader, which has been observed in three distinct versions—.NET, PowerShell, and JScript—is being leveraged as an Initial Access Broker (IAB) in high-stakes ransomware attacks.
CountLoader is an evolving threat designed to deploy secondary payloads, making it a crucial component in the attack chain. Silent Push analysis reveals the malware is apparently used by major ransomware groups, including LockBit, Black Basta, and Qilin, to gain initial entry into target networks.Â
Its different versions exhibit varying levels of sophistication. The JScript variant is the most complex, featuring six different methods for downloading files and functionality to collect detailed system information from victims.
A recent campaign utilizing CountLoader involved a PDF-based phishing lure impersonating the Ukrainian police to target individuals in Ukraine. This strengthens the suspected ties to Russian-speaking threat actors.Â
The loader's command and control (C2) communication pattern is unique, and its code includes advanced features like multi-layered download attempts using LOLBins such as "certutil" and "bitsadmin."
The connection to ransomware operations is a critical piece of cybersecurity threat intelligence. By analyzing Cobalt Strike samples delivered by CountLoader, researchers linked the malware's C2 infrastructure to watermarks previously associated with BlackBasta and Qilin ransomware incidents.Â
The loader frequently stages its payloads in the victim's "Music" folder, a TTP that aligns with past LockBit campaigns.Â
The discovery of CountLoader provides defenders with new indicators to hunt for, as it signifies the initial stage of potentially devastating ransomware attacks. Organizations are urged to review security logs for signs of this new threat.