Skip to content

[Update] win.idat_loader — Propose Merge with win.hijackloader or Populate Stub #78

@ghost

Description

Current State

The Malpedia entry for win.idat_loader is currently an empty stub:

  • No description
  • No references
  • No YARA rules
  • No sample hashes

Meanwhile, Malpedia already lists "IDAT Loader" as a known alias of win.hijackloader.

Proposal

Two options, requesting maintainer guidance on preferred approach:

Option A: Formal Redirect/Merge into win.hijackloader

If the Malpedia maintainers consider IDAT Loader and HijackLoader to be the same family (as the current alias mapping implies), then win.idat_loader should be formally redirected to win.hijackloader to avoid confusion. The "IDAT Loader" alias is already listed under HijackLoader, so having a separate empty entry creates ambiguity for researchers querying the database.

Option B: Populate with IDAT-Specific Technical Details

If the families are considered distinct (some vendors do differentiate them), the win.idat_loader entry should be populated with IDAT-chunk-specific technical details that distinguish it from HijackLoader proper.

Key distinguishing characteristics from our analysis:

  1. IDAT chunk payload storage — The loader specifically abuses PNG IDAT chunk structures to store XOR-encrypted payloads. The IDAT chunks contain encrypted data rather than valid zlib-compressed image data, but the PNG container passes superficial validation.

  2. Modular PE architecture — The decrypted payload contains multiple concatenated PE files (observed: 8 PEs in a single blob), each serving a specific role:

    • tinystub — Minimal stub loaders
    • LauncherLdr64 — Reflective PE loader / shellcode launcher
    • tinyutilitymodule — Anti-forensics module (exports _tiny_erase_)
    • Final payload (Stealc, Amadey, etc.)
  3. DWORD XOR + LZNT1 — Decryption uses a DWORD XOR key from the payload header, followed by LZNT1 decompression via RtlDecompressBuffer.

  4. Delivery via DLL sideloading — Typically arrives through trojanized MSI installers or DLL sideloading chains using legitimate signed binaries.

Supporting Analysis

Recommendation

Given that multiple vendor names exist for overlapping concepts (Rugmi, Penguish, IDAT Loader, HijackLoader), clarifying the taxonomy in Malpedia would benefit the community. At minimum, the empty stub should either be populated or formally merged to avoid dead entries in the database.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions