The GootLoader malware loader has evolved its evasion techniques, now using malformed ZIP archives containing 500 to 1,000 concatenated files that cause security tools to extract harmless decoys while Windows Explorer extracts the actual malicious payload. This technique effectively blinds most analysis tools while maintaining full functionality for victims.

Technique overview

AttributeDetails
Malware familyGootLoader
Evasion methodConcatenated ZIP archives
Archives per file500 to 1,000
DiscoveryExpel Security Research
Ransomware linksRhysida, REvil, BlackCat, INC
First observedNovember 2025 (return from hiatus)

How it works

ZIP file format exploitation

AspectDetails
ZIP parsingFormat reads from end of file
ConcatenationHundreds of ZIPs appended together
Last archiveContains malicious payload
Previous archivesContain decoy/harmless files

The ZIP file format specification reads the file structure from the end, making the last concatenated archive the “valid” one. All previous archives become effectively invisible junk data that doesn’t affect extraction—but confuses security tools.

Tool-dependent extraction

ToolExtraction result
Windows ExplorerMalicious .JS file
7-ZipHarmless .TXT file
WinRARVaries
Security scannersOften extract decoy

The same archive produces completely different results depending on which tool opens it. Windows’ built-in extraction reliably extracts the malicious JavaScript, while third-party tools and security scanners often extract only the harmless decoy.

Anti-analysis features

Per-victim generation

FeaturePurpose
On-the-fly generationEach victim gets unique archive
Randomized metadataDefeats static signatures
HashbustingNo two files share hashes
Dynamic structureArchive count varies

Detection challenges

ChallengeImpact
Tool inconsistencySandboxes may not see payload
Static analysis failureSignatures don’t match
Dynamic variationBehavioral patterns change
Legitimate formatUses valid ZIP structures

Ransomware connections

GootLoader serves as initial access for multiple ransomware operations:

RansomwareRelationship
RhysidaCurrent active partnership
REvilHistorical
BlackCat/ALPHVHistorical
INC RansomwareRecent
ZeppelinHistorical
Quantum LockerHistorical

According to Huntress, GootLoader’s developer is currently working with Vanilla Tempest, a threat actor leveraging Rhysida ransomware.

Detection and mitigation

YARA rule indicators

Expel created detection rules looking for:

IndicatorThreshold
Local file headers>100 occurrences
End of Central Directory>100 occurrences
Archive structure anomaliesMultiple EOCD markers
PriorityAction
HighBlock wscript.exe from executing downloads
HighBlock cscript.exe from executing downloads
HighSet JavaScript to open in Notepad by default (GPO)
MediumMonitor for anomalous ZIP structures
MediumImplement download file inspection

Group Policy configuration

SettingValue
Default handler for .jsnotepad.exe
Script host restrictionsBlock downloaded scripts
Execution policyLimit to signed scripts

Timeline

DateEvent
2014GootLoader first observed
2020-2024Active campaigns with multiple ransomware
Mid-2025Operational hiatus
November 2025Returns with new evasion technique
January 2026Expel publishes analysis

Indicators of compromise

Behavioral indicators

IndicatorDetection
wscript.exe spawning processesProcess monitoring
Large ZIP with many headersFile analysis
JavaScript execution from downloadsExecution logging
Outbound C2 connectionsNetwork monitoring

File characteristics

CharacteristicDescription
File sizeUnusually large for content
StructureMultiple ZIP headers
Extraction varianceDifferent tools, different results

Recommendations

For security teams

PriorityAction
CriticalUpdate detection rules for malformed ZIPs
HighTest sandbox extraction behavior
HighMonitor for GootLoader IoCs
MediumReview script execution policies

For organizations

PriorityAction
HighImplement script blocking policies
HighUse application allowlisting
MediumDeploy behavioral detection
MediumTrain users on ZIP file risks

Context

GootLoader’s concatenated ZIP technique represents a clever exploitation of how different tools implement the ZIP specification. By creating archives that extract differently depending on the tool used, attackers can ensure their payload reaches victims while evading security inspection.

The technique’s effectiveness stems from a fundamental inconsistency: security tools often use third-party libraries that handle edge cases differently than Windows’ native implementation. When a sandbox extracts a harmless text file and marks the archive as safe, the victim’s Windows Explorer extracts the malicious JavaScript.

GootLoader’s return from hiatus with enhanced evasion capabilities, combined with its partnership with Rhysida ransomware operations, signals continued investment in the malware’s development. Organizations should expect this technique to spread to other malware families as its effectiveness becomes apparent.

The recommended mitigation—changing default JavaScript handlers via Group Policy—is simple but highly effective. If .js files open in Notepad instead of executing, the entire attack chain breaks regardless of what the ZIP contains.