Malware & RansomwareHIGH

RoningLoader - New Malware Campaign Evades Detection Tactics

Featured image for RoningLoader - New Malware Campaign Evades Detection Tactics
#RoningLoader#DragonBreath#gh0st RAT#DLL side-loading#code injection

Original Reporting

CSCyber Security News·Tushar Subhra Dutta

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameRoningLoader
Malware TypeMulti-Stage Loader
Threat ActorDragonBreath (APT-Q-27)
Target PlatformWindows
Delivery MethodTrojanized NSIS Installers
Persistence MechanismDLL Side-Loading and Code Injection
C2 Infrastructure
CapabilitiesRemote Access, Disabling Security Tools
IOCs AvailableMalicious DLLs, Trojanized Installers
Detection Rate
MITRE ATT&CKT1574.002, T1055.001
🎯

Basically, RoningLoader is a sneaky malware that hides itself to avoid being caught.

Quick Summary

A new stealthy malware campaign named RoningLoader has emerged, targeting Chinese-speaking users. It cleverly disguises itself as trusted software to evade detection, posing serious risks to security tools. Organizations must remain vigilant against this sophisticated threat.

What Happened

A threat actor known as DragonBreath has launched a stealthy campaign utilizing a multi-stage malware loader called RoningLoader. This malware specifically targets Chinese-speaking users, disguising itself as trusted applications like Google Chrome and Microsoft Teams. Its sophisticated approach combines DLL side-loading, code injection, and signed kernel drivers, allowing it to disable security tools without detection.

How It Works

RoningLoader first appeared in threat intelligence reports in November 2025, documented by Elastic Security Labs. It spreads through trojanized NSIS installers, which are legitimate installer frameworks that attackers often abuse. When a victim runs one of these fake installers, it drops a malicious DLL and an encrypted file disguised as a PNG image. This encrypted file contains shellcode that launches the next stage of the attack entirely in memory, minimizing traces left on disk.

Who's Being Targeted

The primary targets of this campaign include users in China, Taiwan, Hong Kong, Japan, Singapore, and the Philippines. DragonBreath, also tracked as APT-Q-27, has been active since at least 2020, focusing on sectors like online gaming and gambling.

Signs of Infection

RoningLoader employs multiple layers of evasion techniques. It starts with a trojanized installer that runs a legitimate application while executing malware in the background. The malware uses DLL side-loading to trick trusted Windows executables into loading rogue DLLs. It also injects code into regsvr32.exe, further concealing its activities.

How to Protect Yourself

To defend against RoningLoader, security teams should:

  • Monitor for unusual DLL loads from trusted Windows executables.
  • Flag instances of regsvr32.exe launching without direct user action.
  • Set alerts on User Account Control (UAC) registry modifications and unexpected service creations.
  • Regularly validate security controls against RoningLoader's documented tactics, techniques, and procedures (TTPs).

Conclusion

RoningLoader represents a significant threat due to its sophisticated evasion tactics and ability to disable security products like Microsoft Defender. By understanding its methods and implementing proactive security measures, organizations can better protect themselves against this evolving malware landscape.

🔍 How to Check If You're Affected

  1. 1.Monitor for unusual DLL loads from trusted Windows executables.
  2. 2.Flag instances of regsvr32.exe launching without direct user action.
  3. 3.Set alerts on UAC registry modifications and unexpected service creations.

🏢 Impacted Sectors

TechnologyGamingFinance

Pro Insight

🔒 Pro insight: RoningLoader's multi-layered evasion tactics highlight the increasing sophistication of malware targeting specific demographics.

Sources

Original Report

CSCyber Security News· Tushar Subhra Dutta
Read Original

Related Pings

HIGHMalware & Ransomware

Silver Fox Campaign - ValleyRAT Hidden in Telegram Installer

A new malware campaign by the Silver Fox APT group is delivering ValleyRAT through a fake Telegram installer. This poses serious risks to users who may unknowingly install it. Stay vigilant and only download software from trusted sources.

Cyber Security News·
HIGHMalware & Ransomware

Automated Magic Packet Generation - Enhancing Malware Analysis

A new tool automates the creation of packets that trigger BPF malware, drastically cutting analysis time. This impacts sectors like telecommunications and government. Swift action is needed to combat these stealthy threats.

Cloudflare Blog·
HIGHMalware & Ransomware

Dutch Healthcare Software Vendor - Ransomware Attack Disrupts Services

A ransomware attack has taken down Dutch healthcare vendor ChipSoft, disrupting services for hospitals nationwide. This incident highlights ongoing cyber threats in the healthcare sector, raising concerns about patient data security.

The Register Security·
HIGHMalware & Ransomware

Masjesu DDoS Botnet Targets IoT Devices with Evasive Tactics

The Masjesu botnet is now marketed as a DDoS-for-hire service, targeting IoT devices with evasive tactics. Learn how it operates and how to protect yourself.

SecurityWeek·
HIGHMalware & Ransomware

Lua-Based Malware LucidRook Targets Taiwanese NGOs

Cisco Talos has uncovered LucidRook, a new Lua-based malware targeting Taiwanese NGOs. This sophisticated malware uses spear-phishing tactics to infiltrate organizations. Vigilance is crucial as it employs advanced evasion techniques.

Cisco Talos Intelligence·
HIGHMalware & Ransomware

Malicious Chrome Extension - Injects Malware in Browsers

A new malicious Chrome extension, Amazing Refresh, is hijacking user clicks and monetizing traffic without consent. This poses risks to both users and website owners. Immediate action is needed to remove the extension and protect users.

Scott Helme·