We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:JS/Gootloader.A
Aliases: No associated aliases
Summary
Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts.
The Trojan:JS/Gootloader.A variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour.
- Isolate the device from all networks immediately. Disconnect Ethernet cables, deactivate Wi-Fi adapters through the Windows network settings, and turn off Bluetooth. This stops active data exfiltration and prevents the malware from receiving remote threat actor commands.
- End Task all wscript.exe, cscript.exe, and powershell.exe processes that are not initiated by approved administrative activity. Use Process Explorer or taskkill with the /f switch.
- End all unauthorized remote access processes. Specific process names to terminate include AnyDesk.exe and TeamViewer.exe.
- Delete all .lnk files from C:\Users%USERNAME%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ that point to script files in AppData directories.
- Open Task Scheduler and delete any tasks with deceptive names that run script files from user-writable paths. Pay particular attention to tasks that reference AppData or Temp.
- Open Registry Editor and navigate to HKCU\Software\Microsoft\Windows\CurrentVersion\Run and HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce. Delete any values that point to script files in AppData.
- Delete all subkeys under HKCU\SOFTWARE\Microsoft\Phone\ that contain large binary data. Subkeys named %USERNAME% or %USERNAME%0 are indicators of payload storage.
- Delete all subkeys under HKCU\SOFTWARE\Microsoft\Personalization\ that contain large hex-encoded binary values. Examine subkeys with names that appear to be random strings.
- Delete all subkeys under HKCU\SOFTWARE\Microsoft\Fax\ that contain payload fragments. These are often stored across multiple values under a single subkey.
- Conduct a forensic audit of all Domain Controllers. Look for evidence of ntdsutil launches. Check for the existence of c:\temp or similar directories containing Active Directory database files.
- Examine Security Event Logs on Domain Controllers for Event ID 4720. This event indicates new user account creation. Correlate creation times with the known infection window.
- Initiate a domain-wide password reset. Prioritize all privileged accounts including Domain Admins, Enterprise Admins, and service accounts with delegation rights.
- Audit Terminal Server client connection registry keys at HKCU\Software\Microsoft\Terminal Server Client\Servers. This key contains entries for each RDP destination the current user has connected to and can reveal lateral movement paths.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.