sLoad Downloader
First observed in January 2017, sLoad (also known as SnatchLoader) is a PowerShell-based downloader trojan targeting organisations throughout Western Europe and North America.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
First observed in January 2017, sLoad (also known as SnatchLoader) is a PowerShell-based downloader trojan targeting organisations throughout Western Europe and North America.
Affected platforms
The following platforms are known to be affected:
Threat details
Believed to have been created by the TA554 advanced persistent threat, it has been used to deliver a wide range of malware, including Ramnit, Ursnif, and Gootkit.
sLoad is delivered via LNK files distributed through large-scale phishing campaigns. When opened, these LNK files download an initial PowerShell script, which then downloads sLoad and a list of command and control (C2) servers. sLoad will then collect system and user information before connecting to a C2 server and awaiting further commands.
Once installed, sLoad can load and install secondary payloads sent from the C2 server. It will also take screenshots, search the DNS cache for specific domains and check for the presence of ICA files on the system (at the time of publication it is unclear for what purpose).
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect a trojan infection, ensure that:
|
Last edited: 17 February 2020 1:00 pm