{"id":42354,"date":"2021-06-22T00:00:00","date_gmt":"2021-06-22T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore--leaves-it-unused.html"},"modified":"2021-06-22T00:00:00","modified_gmt":"2021-06-22T00:00:00","slug":"nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/","title":{"rendered":"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-header.jpg\"><\/p>\n<p>While investigating&nbsp;samples of&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/19\/k\/mac-backdoor-linked-to-lazarus-targets-korean-users.html\">NukeSped<\/a>,&nbsp;a&nbsp;remote access trojan&nbsp;(RAT),&nbsp;Trend Micro came across&nbsp;several&nbsp;<a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-automatic-classifying-of-mac-os-x-samples.pdf\" target=\"_blank\" rel=\"noopener\">Bundlore<\/a>&nbsp;adware&nbsp;samples using&nbsp;the same&nbsp;fileless routine&nbsp;that was&nbsp;spotted in&nbsp;NukeSped.&nbsp;The&nbsp;backdoor&nbsp;has been&nbsp;attributed to the&nbsp;cybercriminal&nbsp;group&nbsp;Lazarus,&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/cybercrime-and-digital-threats\/a-look-into-the-lazarus-groups-operations\">which has been active since at least 2014<\/a>. There&nbsp;are&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/threat-encyclopedia\/malware\/trojan.macos.nukesped.yxbbs\/\">multiple variants<\/a>&nbsp;of&nbsp;NukeSped, which is&nbsp;designed to run on&nbsp;32-bit systems and uses encrypted strings to evade detection.&nbsp;Recently,&nbsp;<a href=\"https:\/\/threatpost.com\/lazarus-targets-defense-threatneedle-malware\/164321\/\" target=\"_blank\" rel=\"noopener\">a more sophisticated form of&nbsp;this trojan&nbsp;called ThreatNeedle<\/a>&nbsp;surfaced&nbsp;as part of&nbsp;a&nbsp;cyberespionage&nbsp;campaign&nbsp;by Lazarus.&nbsp;&nbsp;<\/p>\n<p>The encrypted&nbsp;Mach-O&nbsp;file discovered in these samples has upgraded&nbsp;Bundlore&nbsp;\u2014 a&nbsp;malware family that installs adware in a target\u2019s device under&nbsp;the guise of&nbsp;downloading legitimate applications&nbsp;\u2014&nbsp;to a stealthier&nbsp;and&nbsp;memory-resident threat.&nbsp;Bundlore&nbsp;has&nbsp;also&nbsp;been known to target macOS&nbsp;devices&nbsp;and was linked&nbsp;to&nbsp;<a href=\"https:\/\/news.sophos.com\/en-us\/2020\/06\/18\/new-bundlore-adware-targets-macos-with-updated-safari-extensions\/\" target=\"_blank\" rel=\"noopener\">an attack on macOS Catalina users<\/a>&nbsp;last year.&nbsp; &nbsp;&nbsp;<\/p>\n<p>Our analysis of the file&nbsp;<i>Ants2WhaleHelper<\/i>&nbsp;used by Lazarus&nbsp;led us to detect it as&nbsp;NukeSped. Another file with NukeSped detection,&nbsp;<i>unioncryptoupdater<\/i>, was also&nbsp;found in&nbsp;VirusTotal. Both contained a routine that looks to be based on&nbsp;<a href=\"https:\/\/github.com\/ytlvy\/CTest\/blob\/9039ccf993c478a29d77018135d992d79c1b1a0a\/C\/RunLib\/run_bin.c\" target=\"_blank\" rel=\"noopener\">a GitHub submission<\/a>. Curiously,&nbsp;however,&nbsp;neither&nbsp;of these files seems&nbsp;to&nbsp;make use of&nbsp;this routine.&nbsp;&nbsp;<\/p>\n<p>Using&nbsp;Interactive&nbsp;Disassembler&nbsp;Pro&nbsp;(IDA Pro)&nbsp;on the&nbsp;<i>Ants2WhaleHelper<\/i>&nbsp;file&nbsp;revealed&nbsp;its main payload&nbsp;as&nbsp;<i>_mapBuffer<\/i>&nbsp;(Figure 1), which appears to be a modified version of the&nbsp;<i>_memory_exec<\/i>&nbsp;function (Figure 2). This function looks like it was based on code from the GitHub post;&nbsp;however,&nbsp;there were no references that point to the&nbsp;<i>_memory_exec<\/i>&nbsp;function.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure01.png\"><br \/>Figure 1. The&nbsp;<i>_mapBuffer<\/i>&nbsp;function&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure02.png\"><br \/>Figure 2.&nbsp;The&nbsp;<i>_memory_exec<\/i>&nbsp;function&nbsp;copied from the GitHub&nbsp;post&nbsp;<\/p>\n<p>Moreover,&nbsp;the payload&nbsp;has&nbsp;a&nbsp;<i>_resolve_symbol<\/i>&nbsp;function&nbsp;that&nbsp;does not seem to be&nbsp;used. It also does not appear to be&nbsp;necessary, as evidenced in&nbsp;Figure 3.&nbsp;NukeSped&nbsp;typically&nbsp;retrieves and launches its payload from a&nbsp;web&nbsp;server, so&nbsp;it does&nbsp;not&nbsp;need the superfulous&nbsp;<i>_resolve_symbol&nbsp;<\/i>function, which locates data internally.&nbsp;As&nbsp;Figure 4&nbsp;shows, searching&nbsp;for the operation&nbsp;codes&nbsp;of this function&nbsp;on&nbsp;VirusTotal&nbsp;led to&nbsp;its&nbsp;detection in 201 files. The results yielded only two&nbsp;NukeSped&nbsp;samples&nbsp;while&nbsp;the&nbsp;rest&nbsp;were&nbsp;Bundlore&nbsp;samples.&nbsp;&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure03.png\"><br \/>Figure 3.&nbsp;The&nbsp;<i>_resolve_symbol<\/i>&nbsp;functions of&nbsp;NukeSped&nbsp;(left) vs.&nbsp;Bundlore&nbsp;(right)&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure04.png\"><br \/>Figure&nbsp;4.&nbsp;The searched&nbsp;operation&nbsp;codes&nbsp;<\/p>\n<p>Similarly, a search using&nbsp;VirusTotal&#8217;s&nbsp;Retrohunt&nbsp;yielded 273 results;&nbsp;most of&nbsp;these&nbsp;were&nbsp;Bundlore&nbsp;files and only three&nbsp;were&nbsp;Nukesped&nbsp;files. However, one of these&nbsp;Nukesped&nbsp;samples was verified as the parent of a&nbsp;Nukesped&nbsp;file from the previous search. Among the&nbsp;Bundlore&nbsp;samples&nbsp;discovered, the oldest one&nbsp;dates&nbsp;back&nbsp;to&nbsp;May&nbsp;of&nbsp;last year. Further investigation of these&nbsp;Bundlore&nbsp;samples&nbsp;from the&nbsp;VirusTotal&nbsp;query revealed that these were indeed using fileless routines,&nbsp;enabling&nbsp;Bundlore&nbsp;to execute&nbsp;a&nbsp;payload directly from memory.&nbsp;&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Bundlore\u2019s&nbsp;fileless routine<\/span><\/p>\n<p>Our study of the&nbsp;Bundlore&nbsp;samples showed&nbsp;that these utilize the same functions that were found&nbsp;unused&nbsp;in the&nbsp;NukeSped&nbsp;samples.&nbsp;As seen in Figure 5, these&nbsp;were obfuscated, as&nbsp;they&nbsp;were under random names when&nbsp;disassembled in IDA Pro.&nbsp;While the functions have some differences, the routine&nbsp;for&nbsp;in-memory file execution&nbsp;remains&nbsp;the same (Figure 6 and 8).&nbsp;&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure05.png\"><br \/>Figure&nbsp;5.&nbsp;The obfuscated functions&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure06.png\"><br \/>Figure&nbsp;6. The disassembly of&nbsp;NukeSped&nbsp;(left column) vs.&nbsp;Bundlore&nbsp;(right column)&nbsp;samples&nbsp;<\/p>\n<p>The main routines of&nbsp;one of the&nbsp;Bundlore&nbsp;samples (sha256:0a3a5854d1ae3f5712774a4eebd819f9e4e3946f36488b4e342f2dd32c8e5db2)&nbsp;are as follows:&nbsp;<\/p>\n<ol readability=\"-1\">\n<li>Decrypt the&nbsp;<i>__DATA.__data<\/i>&nbsp;section to reveal the embedded Mach-O&nbsp;file, as shown in Figure&nbsp;7. The decryption uses&nbsp;an&nbsp;XOR&nbsp;key that&nbsp;is&nbsp;incremented per cycle:&nbsp;for&nbsp;example, a 0xDD increment by 0x2A, 0xDD, 0x00, 0x2A, 0x54, 0x7E, 0xA8, 0xD2, 0xFC, 0x00, and so on.<\/li>\n<p>&nbsp;<img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure07.png\"><br \/>Figure&nbsp;7. The decryption&nbsp;routine&nbsp;of the&nbsp;<i>__DATA.__data<\/i>&nbsp;section&nbsp;<\/p>\n<li>Invoke a function called&nbsp;<i>NSCreateObjectFileImageFromMemory<\/i>&nbsp;to create&nbsp;an&nbsp;adware image from&nbsp;the&nbsp;Mach-O&nbsp;file in memory. Afterward,&nbsp;<i>NSLinkModule<\/i>&nbsp;is called to link the&nbsp;malicious&nbsp;image to the main executable&#8217;s image library. The Mach-O&nbsp;file format&nbsp;is changed&nbsp;from an executable (0x02) to a bundle (0x08) before it can call&nbsp;<i>NSCreateObjectFileImageFromMemory<\/i>, as was shown in Figure 6.&nbsp;&nbsp;<\/li>\n<p><\/p>\n<li>Parse the&nbsp;Mach-O&nbsp;file&#8217;s header structure in memory for&nbsp;<i>value(LC_MAIN)<\/i>, a load command that has the value 0x80000028. This command contains data&nbsp;such as&nbsp;the offset of the&nbsp;Mach-O&nbsp;file&#8217;s entry point (Figure&nbsp;8).&nbsp;Afterward, the&nbsp;adware retrieves the offset&nbsp;and goes&nbsp;to the entry point.&nbsp;<\/li>\n<\/ol>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure08.png\"><br \/>Figure&nbsp;8. Finding the entry&nbsp;point of the malicious image&nbsp;in&nbsp;NukeSped&nbsp;(left column) vs.&nbsp;Bundlore&nbsp;(right column)&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Bundlore\u2019s&nbsp;Mach-O&nbsp;file&nbsp;runs&nbsp;in&nbsp;memory<\/span><\/p>\n<p>The decryption keys and increment values differ across the&nbsp;Bundlore&nbsp;samples. To gain a better understanding of the embedded file, we created a Python script to decrypt and extract their embedded Mach-O files. By doing so, we were able to observe one&nbsp;such&nbsp;decrypted&nbsp;Mach-O&nbsp;file (sha256: a7b6639d9fcdb13ae5444818e1c35fba4ffed90d9f33849d3e6f9b3ba8443bea)&nbsp;with the&nbsp;routines&nbsp;shown in&nbsp;Figure&nbsp;9.&nbsp;It connects&nbsp;to&nbsp;a&nbsp;target URL&nbsp;(13636337101185210173363631[.]cloudfront[.]net\/?cc-00&amp;),&nbsp;but the address&nbsp;varies&nbsp;among&nbsp;the&nbsp;samples.&nbsp;An&nbsp;app bundle called&nbsp;<i>Player.app<\/i>,&nbsp;which poses&nbsp;as Flash Player,<i>&nbsp;<\/i>is then downloaded and extracted&nbsp;into a \/tmp&nbsp;directory.&nbsp;The&nbsp;<i>chmod&nbsp;777<\/i>&nbsp;command&nbsp;is used&nbsp;on the extracted&nbsp;app bundle,&nbsp;after which the fake&nbsp;application&nbsp;is&nbsp;launched.&nbsp;While it performs these routines,&nbsp;Bundlore&nbsp;displays a fraudulent error message (Figure 10).&nbsp;Upon&nbsp;completion,&nbsp;it goes dormant by calling the sleep function and looping it repeatedly.&nbsp;<\/p>\n<p>There were no significant differences seen when running the Bundlore samples in macOS Big Sur and macOS Catalina. However, our researchers found that with the default settings of macOS, in which the System Integrity Protection (SIP) and Gatekeeper security features are enabled, the Bundlore samples are blocked and are unable to run. This was observed in both macOS Catalina and macOS Big Sur environments; similarly, the Bundlore samples were also blocked and unable to run under the default settings of macOS Monterey, Apple&#8217;s recently released operating system.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure09.png\"><br \/>Figure&nbsp;9. The decrypted&nbsp;Mach-O&nbsp;file\u2019s main routines&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore,-leaves-it-unused-\/filelessbundlore-figure10.png\"><br \/>Figure 10.&nbsp;The fake error message displayed by&nbsp;<i>Player.app<\/i><\/p>\n<p><span class=\"body-subhead-title\">Trend Micro&nbsp;Solutions<\/span><\/p>\n<p>Continuous vigilance against threat groups is an important aspect of keeping up with \u2014 if not staying one step ahead of \u2014 threats. To protect systems from this type of threat, users can use multilayered security solutions like&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/antivirus-for-mac.html\">Trend Micro Antivirus for Mac<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection.html\">Trend Micro Protection Suites<\/a>&nbsp;that help detect and block attacks. <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/detection-response.html\" target=\"_blank\" rel=\"noopener\">Trend Micro Vision One\u2122\ufe0f<\/a>&nbsp;also provides visibility, correlated detection, and behavior monitoring across multiple layers, such as emails, endpoints, servers, and cloud workloads. This ensures that no significant incidents go unnoticed and allows faster response to threats before they can do any real damage to the system.&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">MITRE&nbsp;Tactics, Techniques, and Procedures (TTPs)&nbsp;of&nbsp;Bundlore<\/span><\/p>\n<table cellpadding=\"1\" cellspacing=\"2\" border=\"1\">\n<tbody readability=\"1\">\n<tr>\n<th scope=\"col\">Initial Access<\/th>\n<th scope=\"col\">Execution<\/th>\n<th scope=\"col\">Privilege Escalation<\/th>\n<th scope=\"col\">Defense Evasion<\/th>\n<th scope=\"col\">Command and Control (C&amp;C)<\/th>\n<\/tr>\n<tr readability=\"2\">\n<td>Drive-by compromise<\/td>\n<td>User&nbsp;execution<\/td>\n<td>Process&nbsp;injection<\/td>\n<td>Deobfuscate\/Decode files or information<\/td>\n<td>Web service<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>Masquerading<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>Process&nbsp;injection&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span class=\"body-subhead-title\">Indicators of Compromise&nbsp;(IOCs)<\/span><\/p>\n<table cellpadding=\"1\" cellspacing=\"2\" border=\"1\">\n<tbody readability=\"6\">\n<tr>\n<th scope=\"col\">sha256<\/th>\n<th scope=\"col\">File<\/th>\n<th scope=\"col\">Detection<\/th>\n<\/tr>\n<tr readability=\"2\">\n<td>bb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694<\/td>\n<td>Ants2WhaleHelper<\/td>\n<td>Trojan.MacOS.Agent.PFH<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>631ac269925bb72b5ad8f469062309541e1edfec5610a21eecded75a35e65680<\/td>\n<td>unioncryptoupdater<\/td>\n<td>Trojan.MacOS.LAZARUS.A<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>0a3a5854d1ae3f5712774a4eebd819f9e4e3946f36488b4e342f2dd32c8e5db2<\/td>\n<td>smokehouses<\/td>\n<td>Adware.MacOS.BUNDLORE.RSMSGGK20<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>a7b6639d9fcdb13ae5444818e1c35fba4ffed90d9f33849d3e6f9b3ba8443bea<\/td>\n<td>Embedded&nbsp;Mach-O<\/td>\n<td>Adware.MacOS.BUNDLORE.MANP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/nukesped-copies-fileless-code-from-bundlore--leaves-it-unused.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While investigating samples of NukeSped, a remote access trojan (RAT), Trend Micro came across several Bundlore adware samples using the same fileless routine that was spotted in NukeSped. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42355,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9513,9509],"class_list":["post-42354","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-malware","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png\" \/>\n\t<meta property=\"og:image:width\" content=\"985\" \/>\n\t<meta property=\"og:image:height\" content=\"367\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst\",\"datePublished\":\"2021-06-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/\"},\"wordCount\":1609,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/\",\"name\":\"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png\",\"datePublished\":\"2021-06-22T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png\",\"width\":985,\"height\":367},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/","og_locale":"en_US","og_type":"article","og_title":"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-22T00:00:00+00:00","og_image":[{"width":985,"height":367,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst","datePublished":"2021-06-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/"},"wordCount":1609,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Malware","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/","url":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/","name":"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png","datePublished":"2021-06-22T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst.png","width":985,"height":367},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nukesped-copies-fileless-code-from-bundlore-leaves-it-unused-threats-analyst-threats-analyst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Threats Analyst Threats Analyst"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42354"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42354\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42355"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}