Noodlophile Malware Uses Fake Job Offers, Technical Evasion to Bypass Security

Noodlophile Malware Adopts Deceptive Job Offers to Infiltrate Systems

The Noodlophile information stealer, first identified in May 2025, has undergone significant evolution in its attack methodologies to circumvent security defenses. Initially, this malware masqueraded as advertisements for counterfeit AI video generation platforms on social media, enticing users to download malicious ZIP files. These early campaigns primarily aimed to harvest credentials and cryptocurrency wallets, which were then exfiltrated via Telegram bots to the attackers.

In a recent strategic shift, threat actors associated with the Vietnamese group UNC6229 have begun exploiting the global demand for remote work. They now utilize fake job postings to target job seekers, students, and digital marketers. These attacks employ sophisticated phishing lures disguised as employment application forms or skill assessment tests to deliver multi-stage stealers and Remote Access Trojans (RATs) through DLL sideloading techniques.

Following this tactical evolution, analysts identified a unique retaliatory measure embedded deep within the malware’s updated code. The developers padded the malicious files with millions of repetitions of a vulgar Vietnamese phrase directed specifically at a security firm. This massive file bloat was designed to crash AI-based analysis tools that rely on standard Python disassembly libraries like `dis.dis(obj)`, effectively hindering automated threat investigation processes.

Despite these theatrical additions, the malware continues to rely on Telegram bots for command and control communications. The persistence of these attacks underscores the need for heightened awareness among users interacting with online recruitment platforms. The combination of social engineering and technical evasion makes this a potent threat to both individual and enterprise security.

Technical Evasion and Obfuscation Tactics

The latest Noodlophile variants incorporate advanced technical improvements designed to complicate reverse engineering efforts. The developers have implemented the classic `djb2` rotating hashing algorithm within the function loader shellcode. This lightweight method allows for reliable dynamic API resolution, making static analysis significantly more difficult for defenders trying to understand the code’s behavior.

Additionally, the binary now performs a hardcoded signature validation. This internal self-check mechanism detects tampering attempts by anti-analysis or debugging tools, terminating execution if modifications are found. To further secure operations, the attackers added a layer of RC4 encryption to protect the command file, specifically named Chingchong.cmd, obscuring its contents from immediate inspection.

Finally, the attackers have moved away from plain text strings, employing XOR encoding to hide previously visible data. This technique effectively bypasses simple string-based detection rules that security teams often rely upon for quick identification of the malware.

Users must exercise extreme caution with unsolicited job offers and verify the legitimacy of recruitment platforms. Defenders should update detection rules to account for these specific hashing and encryption patterns to prevent infection. Staying vigilant against these evolving tactics is essential for maintaining robust security.