RONINGLOADER: DragonBreath's New Path to PPL Abuse
Elastic Security Labs uncovered a campaign by DragonBreath APT using a multi-stage loader named RONINGLOADER to deploy an updated gh0st RAT variant. The malware employs various evasion techniques targeting Chinese EDR tools, including signed driver abuse, thread-pool injection, and PPL exploitation to disable Microsoft Defender. The infection chain begins with trojanized NSIS installers masquerading as legitimate software. RONINGLOADER leverages multiple stages to terminate antivirus processes, apply custom WDAC policies, and inject the final payload into trusted system processes. The campaign demonstrates an evolution in DragonBreath's tactics, showcasing adaptability and sophisticated evasion methods.
Pulse ID: 691d85c636ef7e742328d734
Pulse Link: https://otx.alienvault.com/pulse/691d85c636ef7e742328d734
Pulse Author: AlienVault
Created: 2025-11-19 08:54:30
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Chinese #CyberSecurity #EDR #ElasticSecurityLabs #ICS #InfoSec #Malware #Microsoft #MicrosoftDefender #OTX #OpenThreatExchange #RAT #Rust #Trojan #bot #AlienVault







& Co. sind angreifbar | heise online 