ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool BIOLOAD

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: BIOLOAD

NamesBIOLOAD
CategoryMalware
TypeLoader
Description(Fortinet) The loader file name is WinBio.dll (note the uppercase characters) and is placed by the attacker alongside the executable in the same folder ('WinBioPlugIns'), thus leveraging the default DLL search order. Because the file path is under %WINDIR%, it means that in order to plant it the attacker needed to have elevated privileges on the victim’s machine such as administrator or a SYSTEM account.

Like Boostwrite, this loader was also developed in C++. It exports only a single function which is the one FaceFodUninstaller.exe imports.
Information<https://www.fortinet.com/blog/threat-research/bioload-fin7-boostwrite-lost-twin.html>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:BIOLOAD>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

Previous: Bioazih
Next: BISCUIT

All groups using tool BIOLOAD

ChangedNameCountryObserved

APT groups

XFIN7Russia2013-Dec 2020 HOTX

1 group listed (1 APT, 0 other, 0 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key