SYMBOLCOMMON_NAMEaka. SYNONYMS
js.mints_loader (Back to overview)

MintsLoader


According to Orange Cyberdefense, MintsLoader is a little-known, multi-stage malware loader that has been used since at least February 2023. It has been observed in widespread distribution campaigns between July and October 2024. The name comes from a very characteristic use of an URL parameter “1.php?s=mintsXX" (with XX being numbers).

MintsLoader primarily delivers malicious RAT or infostealing payloads such as AsyncRAT and Vidar through phishing emails, targeting organizations in Europe (Spain, Italy, Poland, etc.). Written in JavaScript and PowerShell, MintsLoader operates through a multi-step infection process involving several URLs and domains, most of which use a domain generation algorithm (DGA) with .top TLD.

References
2024-10-31nikhilh-20Nikhil Hegde
Deobfuscating JavaScript Malware Using Abstract Syntax Trees
MintsLoader
2024-10-24Orange CyberdefenseAlexis Bonnefoi, Marine PICHON, Vincent HINDERER
MintsLoader
MintsLoader
2024-10-24Orange CyberdefenseAlexis Bonnefoi, Marine PICHON, Vincent HINDERER
Twitter Thread about MintsLoader
MintsLoader

There is no Yara-Signature yet.