Malware News McAfee found a large CountLoader campaign using multi-stage obfuscated delivery; sinkholing revealed 86,000+ infections worldwide.

Khushal

Level 15
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
710
4,464
1,369
Authored by Harshil Patel and Sakshi Jaiswal
McAfee Labs has recently uncovered a large scale CountLoader campaign that uses multiple layers of obfuscation and staged payload delivery to evade detection and maintain persistence in infected systems. The infection process relies on several layers of loaders, including PowerShell scripts, obfuscated JavaScript executed through mshta.exe, and in memory shellcode injection, each stage decrypting and launching the next. The attackers employ a custom encrypted communication protocol to interact with their C2 servers. By registering a backup domain used by the malware, we were able to sinkhole the traffic and observe thousands of infected machines connecting to the C2 infrastructure. Final payload deployed in this campaign is a cryptocurrency clipper, which monitors clipboard activity and replaces copied wallet addresses with attacker controlled ones to redirect cryptocurrency transactions.
 
CountLoader is a good example of why layered loaders are still effective in real-world campaigns.

What stands out in this report

  • The infection chain is multi-stage, which helps the malware avoid simple static detection.
  • It uses common Windows components such as PowerShell and mshta.exe, so parts of the activity can blend in with normal system behavior.
  • The payload delivery appears staged, with each step decrypting or launching the next one rather than dropping everything at once.
  • The final payload being a crypto clipper is notable because the initial infection chain is relatively complex for a payload that is financially opportunistic rather than highly specialized.

Why sinkholing matters here

Sinkholing the fallback domain gives defenders a useful view of how many infected systems are still attempting command-and-control communication. It does not clean infected devices by itself, but it can help researchers measure campaign scale, affected regions, and beaconing patterns.

That kind of visibility is valuable because loaders like this are often reused, updated, or repurposed to deliver different payloads later.

Defender takeaway

For home users and administrators, the practical lessons are fairly standard but important:

  • Be cautious with script-based execution chains involving PowerShell, HTA, and heavily obfuscated JavaScript.
  • Monitor for suspicious use of LOLBins such as mshta.exe.
  • Use reputable endpoint protection, but keep in mind that multi-stage loaders may not be detected at every stage.
  • If cryptocurrency is used on a system, always verify wallet addresses before sending funds, because clipboard hijacking is designed to be silent and easy to miss.

One important limitation

I cannot independently verify every technical detail in the McAfee write-up from the quoted excerpt alone, but the infection pattern described is consistent with how modern loader campaigns often operate.

Bottom line

The most useful point is not just the clipper payload itself, but the delivery method: a layered, evasive loader chain that could potentially be adapted for other malware families as well.
 
In addition to the Bot's post.
  1. The initial loader was unsigned (like most loaders), so it can be blocked by SAC (Stage 1).
  2. The initial PowerShell command can be blocked when using PowerShell in Constrained Language Mode or when blocking PowerShell's outbound connections (Stage 1).
  3. Decoding the obfuscated PowerShell commands can be blocked when using PowerShell in Constrained Language Mode (Stage 2).
  4. Blocking the outbound connections of Mshta LOLBin can break connections to C2 servers (Stage 3).
AVs can fail for a few hours after the first attack, but may be quite effective later, especially for payloads.