Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

HijackLoader

44
Global rank
27 infographic chevron month
Month rank
22 infographic chevron week
Week rank
0
IOCs

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Loader
Type
Unknown
Origin
1 July, 2023
First seen
21 November, 2025
Last seen

How to analyze HijackLoader with ANY.RUN

Type
Unknown
Origin
1 July, 2023
First seen
21 November, 2025
Last seen

IOCs

IP addresses
94.154.35.25
212.11.64.95
167.17.40.170
145.223.69.92
77.91.101.66
166.88.62.248
147.124.219.109
62.60.234.80
194.120.116.197
139.99.16.105
144.76.154.59
185.172.128.212
Hashes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cloudtflare.com
brokpolok.shop
nuevos777.duckdns.org
statswpmy.com
enviopago.mysynology.net
dckis13.duckdns.org
maximo26.duckdns.org
sofiavergara.duckdns.org
gestcular.cfd
dckis7.duckdns.org
7octubredc.duckdns.org
pianepal.com
cosi.com.ar
downloadrufus.com
kmspico-dwnl.com
carrierbrokeragreement.us
directsnap.click
downf.lol
up-community.net
weeklyuploads.click
Last Seen at

Recent blog posts

post image
Detected in 60 Seconds: How to Identify Phish...
watchers 328
comments 0
post image
LOLBin Attacks Explained with Examples: Every...
watchers 1739
comments 0
post image
Healthcare MSSP Cuts Phishing Triage by 76% a...
watchers 434
comments 0

What is HijackLoader malware?

HijackLoader is a loader malware that possesses strong evasion capabilities, allowing it to bypass mainstream security solutions. It has been observed to deliver numerous persistent malware families, such as DanaBot and the RedLine stealer.

Most of the known attacks involving HijackLoader began with phishing emails. As of the end of 2023, it continues to be an active threat. The modular design of the malware is one of the key factors behind its popularity. It enables HijackLoader to ensure a more flexible approach to deployment on the infected system and further execution of the final payloads.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Technical details of the HijackLoader malicious software

HijackLoader is notorious for its ability to evade detection. One way it does this is by utilizing a modified Windows C Runtime (CRT) function to gain a foothold on the device.

During the initial stage, HijackLoader also ascertains whether the final payload is embedded in the binary or has to be downloaded from external sources. It does this through the use of an array of DWORD values.

It can also check if the device is connected to the Internet by attempting to connect to legitimate websites. The network connectivity check is a clever strategy that allows HijackLoader to remain undetected while the network is unavailable. In a similar fashion, the malware can delay the execution of different parts of its code to once again avoid early detection.

To make it more difficult for reverse engineers to analyze its code, the malware uses dynamic API loading via a custom hashing method. This makes it harder to locate the specific API calls used during execution.

HijackLoader’s AVDATA module is designed specifically for the purpose of identifying security software installed on the system and adjusting its operation depending on the results of its scanning.

Execution process of HijackLoader

Let’s take a closer look at the execution flow of a HijackLoader sample by uploading it to the ANY.RUN sandbox.

HijackLoader is a typical loader, and its execution flow is also straightforward and simple. This simplicity allows malware to remain less active inside infected systems, making it more challenging to detect. However, it can still attract attention in certain cases.

In our example, the loader leveraged the CMD utility to stay under the radar. It, in turn, initiates the MSBuild process, which downloads and runs the Phonk which downloads the miner. HijackLoader demonstrates evasion capabilities that aid in staying undetected by certain security solutions.

Analyze malware for free in a fully interactive cloud sandbox – sign up now!

HijackLoader process tree shown in ANY.RUN HijackLoader's process tree demonstrated in ANY.RUN

Distribution methods of the HijackLoader malware

The preferred method of infiltration among the attackers behind HijackLoader is phishing attacks, where cybercriminals craft emails that appear to be from legitimate sources, hoping to trick recipients into opening malicious attachments or clicking on infected links.

In one notable instance, hotels were targeted with emails from fake clients claiming to be staying at the hotel and requesting staff to download a file containing information on their allergy. Once opened, the file kickstarted the infection chain resulting in the deployment of HijackLoader on the victim’s device.

Conclusion

Keeping your infrastructure safe from a HijackLoader infection requires a proactive cybersecurity approach. An indispensable part of it is a reliable malware analysis sandbox like ANY.RUN.

With ANY.RUN, you can example incoming emails to determine any malicious intent behind them with ease. The service’s interactive cloud environment enables you to effectively investigate even the most intricate phishing campaigns and uncover multi-stage attacks in no time. The service delivers comprehensive text reports encompassing detailed information about the submitted files and links, including fresh IOCs.

Adopt a proactive cybersecurity approach by leveraging ANY.RUN.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Black Basta screenshot
Black Basta
blackbasta
Black Basta is a ransomware-as-a-service operated by Storm-1811. It emerged in 2022 and uses double extortion tactics, encrypting data and stealing it for ransom. The malware often gains access through spear-phishing and uses tools like QakBot and Cobalt Strike. It's known for exploiting system vulnerabilities and using advanced obfuscation techniques.
Read More
Phorpiex screenshot
Phorpiex
phorpiex
Phorpiex is a malicious software that has been a significant threat in the cybersecurity landscape since 2016. It is a modular malware known for its ability to maintain an extensive botnet. Unlike other botnets, Phorpiex does not concentrate on DDoS attacks. Instead, it has been involved in numerous large-scale spam email campaigns and the distribution of other malicious payloads, such as LockBit.
Read More
Lynx screenshot
Lynx
lynx
Lynx is a double extortion ransomware: attackers encrypt important and sensitive data and demand a ransom for decryption simultaneously threatening to publish or sell the data. Active since mid-2024. Among techniques are terminating processes and services, privilege escalation, deleting shadow copies. Distribution by phishing, malvertising, exploiting vulnerabilities.
Read More
Havoc screenshot
Havoc
havoc
Havoc is an advanced post-exploitation framework used by hackers to take control of a system once they've breached it. With Havoc, attackers can run commands remotely, inject malicious processes, and access sensitive data. It's often used in targeted attacks, allowing cybercriminals to stay hidden in a network while stealing information or launching further attacks. Its flexibility and ability to bypass detection make it a serious threat, especially in environments that rely on traditional security tools.
Read More
Crocodilus screenshot
Crocodilus
crocodilus
Crocodilus is a highly sophisticated Android banking Trojan that emerged in March 2025, designed for full device takeover. Disguised as legitimate apps, it steals banking credentials, cryptocurrency wallet data, and enables remote control, rapidly evolving into a global threat targeting financial users across Europe, South America, and Asia.
Read More
Mamba 2FA screenshot
Mamba 2FA
mamba
Mamba 2FA is an advanced phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) and target Microsoft 365 accounts. It focuses on intercepting authentication flows in real-time and enables threat actors to hijack user sessions and access sensitive systems even when additional security measures are in place.
Read More