CLAIMLOADER is a malware variant that frequently accompanies legitimate executables that are used for DLL side-loading known to be leveraged by Mustang Panda and was first observed utilized in 2021.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
CLAIMLOADER has added Registry Run keys to achieve persistence using |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
CLAIMLOADER has decoded its payload prior to execution.[1][2] |
|
| Enterprise | T1480 | .002 | Execution Guardrails: Mutual Exclusion |
CLAIMLOADER has created hardcoded mutex to ensure only a single instance of the malware is running.[1][2] |
| Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories |
CLAIMLOADER has modified file attributes to remain hidden to a standard user.[2] |
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL |
CLAIMLOADER has used a legitimately signed executable to execute a malicious payload within a DLL file.[1] |
| Enterprise | T1559 | .001 | Inter-Process Communication: Component Object Model |
CLAIMLOADER has leveraged Component Object Model (COM) objects to create a scheduled task using |
| Enterprise | T1036 | .005 | Masquerading: Match Legitimate Resource Name or Location |
CLAIMLOADER has imitated legitimate software directories through the creation and storage of the EXE and DLL in |
| Enterprise | T1106 | Native API |
CLAIMLOADER has used various Windows API calls during execution, when establishing persistence and defense evasion.[1][2] CLAIMLOADER has also leveraged the legitimate API functions to run its shellcode through the callback function, including |
|
| Enterprise | T1027 | .007 | Obfuscated Files or Information: Dynamic API Resolution |
CLAIMLOADER has utilized XOR-encrypted API names and native APIs of |
| Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
CLAIMLOADER has created scheduled tasks that execute the loader every five(5) minutes using |
| Enterprise | T1204 | .002 | User Execution: Malicious File |
CLAIMLOADER has used tailored decoy documents as part of the installation routine to entice users to open attachments.[2] |
| ID | Name | References |
|---|---|---|
| G0129 | Mustang Panda |