{"id":184363,"date":"2024-02-28T19:02:12","date_gmt":"2024-02-29T03:02:12","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=184363"},"modified":"2024-02-28T19:30:25","modified_gmt":"2024-02-29T03:30:25","slug":"guloader-unmasked-decrypting-the-threat-of-malicious-svg-files","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/","title":{"rendered":"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files"},"content":{"rendered":"<p>Authored by: Vignesh Dhatchanamoorthy<\/p>\n<p>In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding of their tactics and tools. Enter GUloader, a potent weapon in the arsenal of cybercriminals worldwide. This sophisticated malware loader has garnered attention for its stealthy techniques and ability to evade detection, posing a significant risk to organizations and individuals.<\/p>\n<p>One of GUloader&#8217;s distinguishing features is its utilization of evasion techniques, making it particularly challenging for traditional security measures to detect and mitigate. Through polymorphic code and encryption, GUloader can dynamically alter its structure, effectively masking its presence from antivirus software and intrusion detection systems. This adaptability enables GUloader to persistently infiltrate networks and establish footholds for further malicious activity.<\/p>\n<p>McAfee Labs has observed a recent GUloader campaign being distributed through a malicious SVG file delivered via email.<\/p>\n<h2>Scalable Vector Graphics (SVG)<\/h2>\n<p>The SVG (Scalable Vector Graphics) file format is a widely used vector image format designed for describing two-dimensional vector and mixed vector\/raster graphics in XML. One of the key features of SVG files is their support for interactivity and animation, achieved through JavaScript and CSS.<\/p>\n<p>Modern web browsers such as Google Chrome, Mozilla Firefox, and Microsoft Edge have built-in support for rendering SVG files. When you open an SVG file in Chrome or Firefox, the browser renders the vector graphics using its built-in SVG rendering engine. This engine interprets the XML-based SVG code and displays the image accordingly on the web page.<\/p>\n<p>Browsers treat SVG files as standard web content and handle them seamlessly within their browsing environments.<\/p>\n<h2>Execution Chain<\/h2>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-184364\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-1Infection-chain.png\" alt=\"\" width=\"1230\" height=\"296\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-1Infection-chain.png 1230w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-1Infection-chain-300x72.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-1Infection-chain-1024x246.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-1Infection-chain-768x185.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-1Infection-chain-205x49.png 205w\" sizes=\"auto, (max-width: 1230px) 100vw, 1230px\" \/><strong>Figure 1:<\/strong> Infection chain<\/p>\n<p>The execution process begins with the opening of an SVG file from an email attachment. This action triggers the browser to download a ZIP file. Within this ZIP file is a WSF (Windows Script File), acting as the conduit for the subsequent stage. Upon execution of the WSF, wscript calls the PowerShell command to establish a connection with a malicious domain and execute the hosted content. This content includes shellcode injected into the MSBuild application, facilitating further malicious actions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184379\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-2Process-tree.png\" alt=\"\" width=\"790\" height=\"178\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-2Process-tree.png 1038w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-2Process-tree-300x68.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-2Process-tree-1024x231.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-2Process-tree-768x173.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-2Process-tree-205x46.png 205w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 2:<\/strong> Process Tree<\/p>\n<h2>Technical Analysis<\/h2>\n<p>A recipient receives a spam email that contains malware embedded in archived attachments. The attachment contains a malicious SVG file named &#8220;dhgle-Skljdf.svg&#8221;<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184394\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-3-Spam-email.png\" alt=\"\" width=\"844\" height=\"245\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-3-Spam-email.png 1881w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-3-Spam-email-300x87.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-3-Spam-email-1024x297.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-3-Spam-email-768x223.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-3-Spam-email-1536x446.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-3-Spam-email-205x60.png 205w\" sizes=\"auto, (max-width: 844px) 100vw, 844px\" \/><strong>Figure 3:<\/strong> Spam Email<\/p>\n<p>JavaScript that was smuggled inside of the SVG image contained the entire malicious zip archive. When the victim opened the attachment from the email the smuggled JavaScript code inside the SVG image created a malicious zip archive, and then presented the user with a dialog box to decrypt and save the file.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-184409 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-4-Saving-file.png\" alt=\"\" width=\"390\" height=\"281\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-4-Saving-file.png 652w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-4-Saving-file-300x216.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-4-Saving-file-179x129.png 179w\" sizes=\"auto, (max-width: 390px) 100vw, 390px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 4:<\/strong> Saving file prompt<\/p>\n<p>The SVG file utilizes a Blob object that contains the embedded zip file in base64 format. Subsequently, the zip file is dropped via the browser when accessed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-184424\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-5-SVG-code.png\" alt=\"\" width=\"1553\" height=\"590\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-5-SVG-code.png 1553w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-5-SVG-code-300x114.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-5-SVG-code-1024x389.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-5-SVG-code-768x292.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-5-SVG-code-1536x584.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-5-SVG-code-205x78.png 205w\" sizes=\"auto, (max-width: 1553px) 100vw, 1553px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 5<\/strong>: SVG file code<\/p>\n<p>Inside the zip file, there is an obfuscated WSF (Windows Script File). The WSF script employs several techniques to make analysis quite difficult.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-184439\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-6-WSF-script.png\" alt=\"\" width=\"1243\" height=\"759\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-6-WSF-script.png 1243w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-6-WSF-script-300x183.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-6-WSF-script-1024x625.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-6-WSF-script-768x469.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-6-WSF-script-205x125.png 205w\" sizes=\"auto, (max-width: 1243px) 100vw, 1243px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 6:<\/strong> Obfuscated WSF Script<\/p>\n<p>It invokes PowerShell to establish a connection with a malicious domain, subsequently executing the hosted content retrieved from it.<\/p>\n<p><strong>Encoded PowerShell<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-184454\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-7-Encoded-PS.png\" alt=\"\" width=\"1829\" height=\"656\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-7-Encoded-PS.png 1829w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-7-Encoded-PS-300x108.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-7-Encoded-PS-1024x367.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-7-Encoded-PS-768x275.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-7-Encoded-PS-1536x551.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-7-Encoded-PS-205x74.png 205w\" sizes=\"auto, (max-width: 1829px) 100vw, 1829px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 7:<\/strong> Encoded PowerShell code<\/p>\n<p><strong>After Decoding<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184469\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-8-Decoded-PS.png\" alt=\"\" width=\"870\" height=\"197\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-8-Decoded-PS.png 1008w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-8-Decoded-PS-300x68.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-8-Decoded-PS-768x174.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-8-Decoded-PS-205x46.png 205w\" sizes=\"auto, (max-width: 870px) 100vw, 870px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 8<\/strong>: Decoded PowerShell code<\/p>\n<p><strong>URL:<\/strong> hxxps:\/\/winderswonders.com\/JK\/Equitably.mix<\/p>\n<p>The URL hosts base64-encoded content, which, after decoding, contains shellcode and a PowerShell script.<\/p>\n<p><strong>Hosted Content<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184484\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-9-Hosted-Content.png\" alt=\"\" width=\"837\" height=\"297\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-9-Hosted-Content.png 1878w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-9-Hosted-Content-300x106.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-9-Hosted-Content-1024x363.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-9-Hosted-Content-768x272.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-9-Hosted-Content-1536x545.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-9-Hosted-Content-205x73.png 205w\" sizes=\"auto, (max-width: 837px) 100vw, 837px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 9:<\/strong> Hosted Base64 content<\/p>\n<p><strong>After decoding Base64<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-184499\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-10-Decoded-content.png\" alt=\"\" width=\"1809\" height=\"776\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-10-Decoded-content.png 1809w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-10-Decoded-content-300x129.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-10-Decoded-content-1024x439.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-10-Decoded-content-768x329.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-10-Decoded-content-1536x659.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Fig-10-Decoded-content-205x88.png 205w\" sizes=\"auto, (max-width: 1809px) 100vw, 1809px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 10:<\/strong> Decoded Base64 content<\/p>\n<p>The above PowerShell script attempts to load the shellcode into the legitimate MSBuild process using the Process Hollowing technique.<\/p>\n<p>After injection, the shellcode executes anti-analysis check then it modifies the Registry run key to achieve persistence.<\/p>\n<p>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run<\/p>\n<p>The final stage uses the injected shellcode to download and execute the final malicious executable. GuLoader can also download and deploy a wide range of other malware variants.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Indicator of Compromise (IOCs)<\/strong><\/h2>\n<table width=\"631\">\n<tbody>\n<tr>\n<td width=\"63\"><strong>File<\/strong><\/td>\n<td width=\"568\"><strong>SHA256\/URL<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"63\">Email<\/td>\n<td width=\"568\">66b04a8aaa06695fd718a7d1baa19386922b58e797634d5ac4ff96e79584f5c1<\/td>\n<\/tr>\n<tr>\n<td width=\"63\">SVG<\/td>\n<td width=\"568\">b20ea4faca043274bfbb1f52895c02a15cd0c81a333c40de32ed7ddd2b9b60c0<\/td>\n<\/tr>\n<tr>\n<td width=\"63\">WSF<\/td>\n<td width=\"568\">0a196171571adc8eb9edb164b44b7918f83a8425ec3328d9ebbec14d7e9e5d93<\/td>\n<\/tr>\n<tr>\n<td width=\"63\">URL<\/td>\n<td width=\"568\">hxxps:\/\/winderswonders[.]com\/JK\/Equitably[.]mix<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding&#8230;<\/p>\n","protected":false},"author":695,"featured_media":178396,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-184363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>GUloader Unmasked: Decrypting the Threat of Malicious SVG Files | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-29T03:02:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-29T03:30:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files\",\"datePublished\":\"2024-02-29T03:02:12+00:00\",\"dateModified\":\"2024-02-29T03:30:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/\"},\"wordCount\":703,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/\",\"name\":\"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png\",\"datePublished\":\"2024-02-29T03:02:12+00:00\",\"dateModified\":\"2024-02-29T03:30:25+00:00\",\"description\":\"Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files | McAfee Blog","description":"Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files | McAfee Blog","og_description":"Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-02-29T03:02:12+00:00","article_modified_time":"2024-02-29T03:30:25+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files","datePublished":"2024-02-29T03:02:12+00:00","dateModified":"2024-02-29T03:30:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/"},"wordCount":703,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/","name":"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png","datePublished":"2024-02-29T03:02:12+00:00","dateModified":"2024-02-29T03:30:25+00:00","description":"Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_120723.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"GUloader Unmasked: Decrypting the Threat of Malicious SVG Files"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/184363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=184363"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/184363\/revisions"}],"predecessor-version":[{"id":184518,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/184363\/revisions\/184518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/178396"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=184363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=184363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=184363"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=184363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}