Threat Database Malware GachiLoader Malware

GachiLoader Malware

Security researchers have uncovered a newly identified JavaScript-based malware loader known as GachiLoader, developed using Node.js and protected by heavy obfuscation. This malware is actively propagated through the so-called YouTube Ghost Network, a collection of hijacked YouTube accounts repurposed to distribute malicious content to unsuspecting users.

Abuse of YouTube for Malware Distribution

The campaign leverages compromised creator accounts to upload weaponized videos that redirect viewers to malware-laced downloads. Roughly 100 videos tied to this operation have been identified, collectively drawing around 220,000 views. These uploads originated from 39 breached accounts, with the earliest activity traced back to December 22, 2024. While Google has since removed most of the content, the reach achieved before takedown underscores the effectiveness of the distribution method.

Advanced Payload Delivery via Kidkadi

One observed variant of GachiLoader deploys a secondary malware component named Kidkadi, which introduces an unconventional Portable Executable (PE) injection approach. Instead of directly loading a malicious binary, the technique initially loads a legitimate DLL and then exploits Vectored Exception Handling (VEH) to dynamically replace it with a malicious payload during runtime. This on-the-fly substitution allows the malware to blend in with legitimate processes.

Multi-Payload Capability and Stealth Operations

Beyond Kidkadi, GachiLoader has also been documented delivering the Rhadamanthys information stealer, demonstrating its flexibility as a malware delivery platform. Like other modern loaders, it is designed to fetch and deploy additional payloads while simultaneously performing extensive anti-analysis and evasion checks to hinder detection and forensic investigation.

Privilege Escalation Through Social Engineering

The loader checks whether it is executing with administrative privileges by running the net session command. If this test fails, it attempts to relaunch itself with elevated rights, prompting a User Account Control (UAC) dialog. Because the malware is commonly embedded in fake installers posing as popular software, similar to techniques previously seen with CountLoader, victims are likely to approve the request, unknowingly granting elevated access.

Neutralizing Microsoft Defender

In its final execution stage, GachiLoader actively attempts to weaken built-in security defenses. It targets and terminates SecHealthUI.exe, a process linked to Microsoft Defender, and then configures exclusion rules to prevent scanning of specific directories such as user folders, ProgramData, and Windows system paths. This ensures that any staged or downloaded payloads remain undetected.

Final Payload Execution Path

Once defenses are suppressed, GachiLoader either retrieves the final malware directly from a remote server or invokes an auxiliary loader called kidkadi.node. This component again abuses Vectored Exception Handling to load the primary malicious payload, maintaining consistency with the loader’s stealth-focused design.

Implications for Defenders and Researchers

The actor behind GachiLoader demonstrates a deep understanding of Windows internals and has successfully evolved a known injection technique into a more evasive variant. This development reinforces the importance for defenders and malware analysts to continuously track advancements in PE injection methods and loader-based architectures, as threat actors persistently refine their tactics to bypass modern security controls.

Trending

Most Viewed

Loading...