HexEval Loader is a hex-encoded loader that collects host data, decodes follow-on scripts and acts as a downloader for the BeaverTail malware. HexEval Loader was first reported in April 2025. HexEval Loader has previously been leveraged by North Korea-affiliated threat actors identified as Contagious Interview. HexEval Loader has been delivered to victims through code repository sites utilizing typosquatting naming conventions of various npm packages.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
HexEval Loader has used HTTP and HTTPS POST requests to communicate with C2.[1][2][3] |
| Enterprise | T1059 | .007 | Command and Scripting Interpreter: JavaScript |
HexEval Loader has executed malicious JavaScript code.[1][3] |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information |
HexEval Loader has decoded its payload prior to execution.[1][2][3] |
|
| Enterprise | T1041 | Exfiltration Over C2 Channel |
HexEval Loader has exfiltrated victim data using HTTPS POST requests to its C2 servers.[1][3] |
|
| Enterprise | T1105 | Ingress Tool Transfer |
HexEval Loader has been used to download a malicious payload to include BeaverTail.[1][2][3] |
|
| Enterprise | T1056 | .001 | Input Capture: Keylogging |
HexEval Loader has utilized a cross-platform keylogger that has the capability to capture keystrokes on Windows, macOS and Linux systems.[3] |
| Enterprise | T1036 | .005 | Masquerading: Match Legitimate Resource Name or Location |
HexEval Loader has masqueraded and typosquatted as legitimate code repository packages and projects.[1][3] |
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
HexEval Loader has encoded module names and C2 URLs as hexadecimal strings in attempts to evade analysis.[1][3] |
| Enterprise | T1082 | System Information Discovery |
HexEval Loader has identified the OS and MAC address of victim device through host fingerprinting scripting.[3] |
|
| Enterprise | T1614 | System Location Discovery |
HexEval Loader has a function where the C2 endpoint can identify the geographical location of a victim host based on request headers, execution environment and runtime conditions.[3] |
|
| Enterprise | T1016 | System Network Configuration Discovery |
HexEval Loader has leveraged server-side client configurations to identify the public IP of the victim host.[3] |
|
| Enterprise | T1033 | System Owner/User Discovery |
HexEval Loader has collected the username from the victim host.[3] |
|
| ID | Name | References |
|---|---|---|
| G1052 | Contagious Interview |