A groundbreaking study by the FortiGuard team exposes the intricacies of a sophisticated malware distribution strategy known as the “TicTacToe dropper.” This technique, observed extensively throughout 2023, utilizes multiple layers of obfuscated payloads to deliver malicious software to victims. The droppers, concealed within phishing emails containing .iso file attachments, employ intricate obfuscation techniques to evade antivirus detection, making analysis and detection challenging. Despite variations in payload delivery, common behaviors allowed researchers to identify and categorize these droppers, shedding light on their modus operandi.
The analysis revealed a diverse array of final-stage payloads, including well-known malware like AgentTesla, LokiBot, and Remcos. These payloads, concealed within reflective loading processes and .NET executables/libraries, pose a significant threat to organizations. Additionally, the study suggests that the TicTacToe dropper is likely sold as a service to threat actors, indicating its widespread availability and potential impact.
To combat this evolving threat, organizations are advised to implement solutions capable of preventing the execution of these droppers, thereby mitigating the risk of loading malicious payloads. By understanding the tactics employed by threat actors and deploying proactive security measures, organizations can safeguard against the TicTacToe dropper and its associated malware.